Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-08-24Kaspersky LabsKaspersky
Naikon Targeted Attacks
APT30 Naikon
2017-08-15Kaspersky LabsGReAT
ShadowPad in corporate networks
ShadowPad
2017-08-09Kaspersky LabsAnton Ivanov, Orkhan Mamedov
The return of Mamba ransomware
Mamba
2017-08-08Kaspersky LabsGReAT
APT Trends report Q2 2017
IndigoZebra
2017-07-31Kaspersky LabsRoman Unuchek
A new era in mobile banking Trojans
Svpeng
2017-07-24Kaspersky LabsNoushin Shabab
Spring Dragon – Updated Activity
LOTUS PANDA
2017-07-19Kaspersky LabsSergey Yunakovsky
The NukeBot banking Trojan: from rough drafts to real threats
TinyNuke
2017-07-12Kaspersky LabsSergey Yunakovsky
The Magala Trojan Clicker: A Hidden Advertising Threat
Magala
2017-06-30Kaspersky LabsGReAT
From BlackEnergy to ExPetr
EternalPetya
2017-06-28Kaspersky LabsAnton Ivanov, Orkhan Mamedov
ExPetr/Petya/NotPetya is a Wiper, Not Ransomware
EternalPetya
2017-06-27Kaspersky LabsGReAT
Schroedinger’s Pet(ya)
EternalPetya
2017-06-27Kaspersky LabsSergey Yunakovsky
Neutrino modification for POS-terminals
Neutrino POS
2017-06-20Kaspersky LabsRoman Unuchek
Ztorg: from rooting to SMS
Ztorg
2017-06-08Kaspersky LabsRoman Unuchek
Dvmap: the first Android malware with code injection
Dvmap
2017-05-25Kaspersky LabsNikita Slepogin
Dridex: A History of Evolution
Dridex Feodo
2017-05-12Kaspersky LabsGReAT
WannaCry ransomware used in widespread attacks all over the world
WannaCryptor
2017-05-01Kaspersky LabsKaspersky
Crouching Yeti (Energetic Bear) Malware
ENERGETIC BEAR
2017-04-28Kaspersky LabsAlexey Shulmin, Sergey Yunakovsky
Use of DNS Tunneling for C&C Communications
SOUNDBITE
2017-04-24Kaspersky LabsAnton Ivanov, Fabio Assolini, Fedor Sinitsyn, Santiago Pontiroli
XPan, I am your father
Xpan
2017-04-11Kaspersky LabsGReAT
Unraveling the Lamberts Toolkit