Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-08-05SecureworksCTU Research Team
Threat Group 3390 Cyberespionage
2015-07-29Youtube (FireEye Inc.)FireEye
HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group
tDiscoverer
2015-07-08Kaspersky LabsGReAT
Wild Neutron – Economic espionage threat actor returns with new tricks
JripBot
2015-07-08Kaspersky LabsGReAT
Wild Neutron – Economic espionage threat actor returns with new tricks
WildNeutron
2015-07-01FireEyeFireEye Threat Intelligence
HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group
tDiscoverer APT29
2015-06-16Palo Alto Networks Unit 42Unit42
Operation Lotus Blossom: A New Nation-State Cyberthreat?
LOTUS PANDA
2015-05-13CylanceJon Gross
Cylance SPEAR Team: A Threat Actor Resurfaces
GreenShaitan
2015-05-04Cisco TalosAlex Chiu, Ben Baker
Threat Spotlight: Rombertik – Gazing Past the Smoke, Mirrors, and Trapdoors
Rombertik
2015-04-27Cisco TalosAndrea Allievi, Earl Carter, Emmanuel Tacheau
Threat Spotlight: TeslaCrypt – Decrypt It Yourself
TeslaCrypt
2015-03-30SymantecChristian Tripputi
New reconnaissance threat Trojan.Laziok targets the energy sector
Laziok
2015-03-20Cisco TalosAlain Zidouemba, Andrea Allievi, Angel Villegas, Ben Baker, Douglas Goddard, JJ Cummings, Nick Biasini, William Largent
Threat Spotlight: PoSeidon, A Deep Dive Into Point of Sale Malware
FindPOS
2015-02-27ThreatConnectThreatConnect Research Team
The Anthem Hack: All Roads Lead to China
HttpBrowser
2015-02-27ThreatConnectThreatConnect Research Team
The Anthem Hack: All Roads Lead to China
Derusbi
2015-02-25Trend MicroTrend Micro Threat Research Team
OPERATION ARID VIPER: Bypassing the Iron Dome
AridViper
2015-02-10CrowdStrikeCrowdStrike
Global Threat Intel Report
MAGNETIC SPIDER PALE PANDA PREDATOR PANDA SABRE PANDA SPICY PANDA WET PANDA
2015-02-06CrowdStrikeCrowdStrike
CrowdStrike Global Threat Intel Report 2014
BlackPOS CryptoLocker Derusbi Elise Enfal EvilGrab Gameover P2P HttpBrowser Medusa Mirage Naikon NetTraveler pirpi PlugX Poison Ivy Sakula RAT Sinowal sykipot taidoor
2015-02-01Trend MicroTrend Micro Threat Research Team
Operation Arid Viper - Bypassing the Iron Dome
2015-01-01ThreatConnectThreatConnect
Naikon Tag in ThreatConnect Blogs
APT30 Naikon
2014-12-09ThreatpostMichael Mimoso
Linux Modules Connected to Turla APT Discovered
Turla
2014-10-28CiscoAlain Zidouemba, Andrea Allievi, Douglas Goddard, Shaun Hurley
Threat Spotlight: Group 72, Opening the ZxShell
ZXShell