Click here to download all references as Bib-File.•
2015-08-05
⋅
Secureworks
⋅
Threat Group 3390 Cyberespionage |
2015-07-29
⋅
Youtube (FireEye Inc.)
⋅
HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group tDiscoverer |
2015-07-08
⋅
Kaspersky Labs
⋅
Wild Neutron – Economic espionage threat actor returns with new tricks JripBot |
2015-07-08
⋅
Kaspersky Labs
⋅
Wild Neutron – Economic espionage threat actor returns with new tricks WildNeutron |
2015-07-01
⋅
FireEye
⋅
HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group tDiscoverer APT29 |
2015-06-16
⋅
Palo Alto Networks Unit 42
⋅
Operation Lotus Blossom: A New Nation-State Cyberthreat? LOTUS PANDA |
2015-05-13
⋅
Cylance
⋅
Cylance SPEAR Team: A Threat Actor Resurfaces GreenShaitan |
2015-05-04
⋅
Cisco Talos
⋅
Threat Spotlight: Rombertik – Gazing Past the Smoke, Mirrors, and Trapdoors Rombertik |
2015-04-27
⋅
Cisco Talos
⋅
Threat Spotlight: TeslaCrypt – Decrypt It Yourself TeslaCrypt |
2015-03-30
⋅
Symantec
⋅
New reconnaissance threat Trojan.Laziok targets the energy sector Laziok |
2015-03-20
⋅
Cisco Talos
⋅
Threat Spotlight: PoSeidon, A Deep Dive Into Point of Sale Malware FindPOS |
2015-02-27
⋅
ThreatConnect
⋅
The Anthem Hack: All Roads Lead to China HttpBrowser |
2015-02-27
⋅
ThreatConnect
⋅
The Anthem Hack: All Roads Lead to China Derusbi |
2015-02-25
⋅
Trend Micro
⋅
OPERATION ARID VIPER: Bypassing the Iron Dome AridViper |
2015-02-10
⋅
CrowdStrike
⋅
Global Threat Intel Report MAGNETIC SPIDER PALE PANDA PREDATOR PANDA SABRE PANDA SPICY PANDA WET PANDA |
2015-02-06
⋅
CrowdStrike
⋅
CrowdStrike Global Threat Intel Report 2014 BlackPOS CryptoLocker Derusbi Elise Enfal EvilGrab Gameover P2P HttpBrowser Medusa Mirage Naikon NetTraveler pirpi PlugX Poison Ivy Sakula RAT Sinowal sykipot taidoor |
2015-02-01
⋅
Trend Micro
⋅
Operation Arid Viper - Bypassing the Iron Dome |
2015-01-01
⋅
ThreatConnect
⋅
Naikon Tag in ThreatConnect Blogs APT30 Naikon |
2014-12-09
⋅
Threatpost
⋅
Linux Modules Connected to Turla APT Discovered Turla |
2014-10-28
⋅
Cisco
⋅
Threat Spotlight: Group 72, Opening the ZxShell ZXShell |