Click here to download all references as Bib-File.•
2015-03-19
⋅
Palo Alto Networks Unit 42
⋅
FindPOS: New POS Malware Family Discovered FindPOS |
2015-01-26
⋅
CrowdStrike
⋅
Storm Chasing: Hunting Hurricane Panda HURRICANE PANDA |
2014-11-21
⋅
FireEye
⋅
Operation Double Tap pirpi |
2014-07-31
⋅
FireEye
⋅
Spy of the Tiger paladin APT24 |
2014-07-15
⋅
Palo Alto Networks Unit 42
⋅
Unit 42 Technical Analysis: Seaduke SEADADDY |
2014-07-09
⋅
FireEye
⋅
BrutPOS: RDP Bruteforcing Botnet Targeting POS Systems BrutPOS |
2013-12-09
⋅
Trustwave
⋅
The Curious Case of the Malicious IIS Module IISniff |
2013-09-26
⋅
Malwarebytes
⋅
New Solarbot Malware Debuts, Creator Publicly Advertising Solarbot |
2013-08-01
⋅
Malwarebytes
⋅
Sophos Discovers ZeroAccess Using RLO ZeroAccess |
2013-07-25
⋅
Malwarebytes
⋅
ZeroAccess uses Self-Debugging ZeroAccess |
2013-06-03
⋅
Trustwave
⋅
Alina: Following The Shadow Part 2 Alina POS |
2013-05-17
⋅
Trustwave
⋅
Alina: Following The Shadow Part 1 Alina POS |
2013-05-08
⋅
SpiderLabs Blog
⋅
Alina: Casting a Shadow on POS Alina POS |
2012-12-13
⋅
SpiderLabs Blog
⋅
The Dexter Malware: Getting Your Hands Dirty |