Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-03-08FireEyeFireEye
SOUTHEAST ASIA: AN EVOLVING CYBER THREAT LANDSCAPE
APT5
2016-03-03Kaspersky LabsMikhail Kuzin, Nikita Buchka
Attack on Zygote: a new twist in the evolution of mobile threats
Triada
2016-02-25Palo Alto Networks Unit 42Jeff White
KeyBase Threat Grows Despite Public Takedown: A Picture is Worth a Thousand Words
KeyBase
2016-02-24ThreatpostMichael Mimoso
Operation Blockbuster Coalition Ties Destructive Attacks to Lazarus Group
Lazarus Group
2016-01-28FireEyeFireEye Threat Intelligence
CenterPOS: An Evolving POS Threat
CenterPOS
2016-01-27Fidelis CybersecurityThreat Research Team
Introducing Hi-Zor RAT
Hi-Zor RAT
2016-01-12FireEyeBarry Vengerik, John Miller
The Magnificent FIN7: Revealing a Cybercriminal Threat Group
BABYMETAL
2015-12-31ThreatBook
Overseas "Dark Inn" organization launched an APT attack on executives of domestic enterprises
DarkHotel
2015-12-21FireEyeFireEye Threat Intelligence, Ryann Winters
The EPS Awakens - Part 2
ELMER IRONHALO EvilPost
2015-12-08The CitizenlabClaudio Guarnieri, John Scott-Railton, Marion Marschalek, Morgan Marquis-Boire
Packrat: Seven Years of a South American Threat Actor
AdWind Adzok CyberGate Xtreme RAT Packrat
2015-12-07FireEyeDimiter Andonov, Jay Taylor, Nalani Fraser, Will Matson, William Ballenthin
Thriving Beyond The Operating System: Financial Threat Group Targets Volume Boot Record
FIN1
2015-12-07SymantecSecurity Response
Iran-based attackers use back door threats to spy on Middle Eastern targets
CadelSpy Remexi Cadelle
2015-12-07SymantecSymantec Security Response
Iran-based attackers use back door threats to spy on Middle Eastern targets
APT39 Cadelle
2015-12-01FireEyeFireEye Threat Intelligence
China-based Cyber Threat Group Uses Dropbox for Malware Communications and Targets Hong Kong Media Outlets
BUBBLEWRAP LOWBALL TEMPER PANDA
2015-11-11ProofpointDarien Huss
AbaddonPOS: A new point of sale threat linked to Vawtrak
AbaddonPOS TinyLoader
2015-10-06ThreatpostMichael Mimoso
Targeted Attack Exposes OWA Weakness
owaauth
2015-09-14Kaspersky LabsFedor Sinitsyn, Victor Alyushin
The Shade Encryptor: a Double Threat
CMSBrute Troldesh
2015-09-10FireEyeGenwei Jiang, Josiah Kimble
Hangul Word Processor (HWP)Zero-Day: possible ties to North Korean threat actors
HOPLIGHT
2015-08-17F-Secure LabsF-Secure Threat Intelligence Team, Noora Hyvärinen
THE DUKES 7 YEARS OF RUSSIAN CYBERESPIONAGE
COZYDUKE GeminiDuke
2015-08-05SecureworksCTU Research Team
Threat Group 3390 Cyberespionage
APT27