Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-04-27Cisco TalosAndrea Allievi, Earl Carter, Emmanuel Tacheau
Threat Spotlight: TeslaCrypt – Decrypt It Yourself
TeslaCrypt
2015-03-30SymantecChristian Tripputi
New reconnaissance threat Trojan.Laziok targets the energy sector
Laziok
2015-03-20Cisco TalosAlain Zidouemba, Andrea Allievi, Angel Villegas, Ben Baker, Douglas Goddard, JJ Cummings, Nick Biasini, William Largent
Threat Spotlight: PoSeidon, A Deep Dive Into Point of Sale Malware
FindPOS
2015-02-27ThreatConnectThreatConnect Research Team
The Anthem Hack: All Roads Lead to China
HttpBrowser
2015-02-27ThreatConnectThreatConnect Research Team
The Anthem Hack: All Roads Lead to China
Derusbi
2015-02-25Trend MicroTrend Micro Threat Research Team
OPERATION ARID VIPER: Bypassing the Iron Dome
AridViper
2015-02-10CrowdStrikeCrowdStrike
Global Threat Intel Report
MAGNETIC SPIDER PALE PANDA PREDATOR PANDA SABRE PANDA SPICY PANDA WET PANDA
2015-02-06CrowdStrikeCrowdStrike
CrowdStrike Global Threat Intel Report 2014
BlackPOS CryptoLocker Derusbi Elise Enfal EvilGrab Gameover P2P HttpBrowser Medusa Mirage Naikon NetTraveler pirpi PlugX Poison Ivy Sakula RAT Sinowal sykipot taidoor
2015-02-01Trend MicroTrend Micro Threat Research Team
Operation Arid Viper - Bypassing the Iron Dome
2015-01-01ThreatConnectThreatConnect
Naikon Tag in ThreatConnect Blogs
APT30 Naikon
2014-12-09ThreatpostMichael Mimoso
Linux Modules Connected to Turla APT Discovered
Turla
2014-10-28CiscoAlain Zidouemba, Andrea Allievi, Douglas Goddard, Shaun Hurley
Threat Spotlight: Group 72, Opening the ZxShell
ZXShell
2014-10-06FireEyeNart Villeneuve
Data Theft in Aisle 9: A FireEye Look at Threats to Retailers
2014-05-28iSIGHT Partners (FireEye)iSIGHT Partners
NEWSCASTER: An Iranian Threat Within Social Networks
Charming Kitten
2014-05-01Arbor NetworksASERT Threat Intelligence
Into the Light of Day:Uncovering Ongoing and Historical Point of Sale Malware and Attack Campaigns
poscardstealer
2014-03-13Threatpost2014-03-13
Energy Watering Hole Attack Used LightsOut Exploit Kit
ENERGETIC BEAR
2014-03-06ThreatpostChris Brook
Dexter, Project Hook POS Malware Campaigns Persist
Project Hook POS
2014-02-19FireEyeJames T. Bennett, Nart Villeneuve
XtremeRAT: Nuisance or Threat?
Xtreme RAT
2014-02-14SecureworksCounter Threat Unit ResearchTeam
Analysis of DHS NCCIC Indicators
jspRAT BeepService DDKeylogger LinseningSvr ONHAT SimpleFileMover ZiyangRAT
2014-01-01RSARSA Research
RSA Incident Response: Emerging Threat Profile Shell_Crew
Derusbi