Click here to download all references as Bib-File.•
2017-12-06
⋅
The Citizen Lab
⋅
Champing at the Cyberbit Ethiopian Dissidents Targeted with New Commercial Spyware PC Surveillance System |
2017-11-20
⋅
McAfee
⋅
Android Malware Appears Linked to Lazarus Cybercrime Group HARDRAIN |
2017-10-31
⋅
McAfee
⋅
Expiro Malware Is Back and Even Harder to Remove Expiro |
2017-09-01
⋅
Bitdefender
⋅
EHDevel – The story of a continuously improving advanced threat creation toolkit EHDevel |
2017-08-07
⋅
Independent.ie
⋅
'State-sponsored' hackers targeted EirGrid electricity network in 'devious attack' ENERGETIC BEAR |
2017-07-18
⋅
Bitdefender
⋅
Inexsmar: An unusual DarkHotel campaign DarkHotel |
2017-07-04
⋅
McAfee
⋅
Important information about Night Dragon Night Dragon |
2017-07-01
⋅
Secrary Blog
⋅
Remcos RAT Remcos |
2017-06-08
⋅
Youtube (Kaspersky)
⋅
THE SEVEN YEAR ITCH |
2017-06-01
⋅
McAfee
⋅
McAfee Labs Threats Report Pony |
2017-05-19
⋅
Malwarebytes
⋅
How did the WannaCry ransomworm spread? WannaCryptor |
2017-05-05
⋅
Bitdefender
⋅
Inside Netrepser – a JavaScript-based Targeted Attack Netrepser |
2017-05-03
⋅
FireEye
⋅
To SDB, Or Not To SDB: FIN7 Leveraging Shim Databases for Persistence FIN7 |
2017-02-14
⋅
Fortinet
⋅
REMCOS: A New RAT In The Wild Remcos |
2016-09-27
⋅
Best Security Research
⋅
New Voldemort/Nagini Ransomware Virus Infection Nagini |
2016-09-23
⋅
SecurityIntelligence
⋅
Dissecting a Hacktivist’s DDoS Tool: Saphyra Revealed Saphyra |
2016-09-07
⋅
Twitter (smoothimpact)
⋅
Tweet with hashes on APT3 APT3 Keylogger |
2016-07-21
⋅
McAfee
⋅
Phishing Attacks Employ Old but Effective Password Stealer ISR Stealer |
2015-10-01
⋅
Check Point
⋅
Digging for Groundhogs: Holes in your Linux server XOR DDoS |
2015-04-14
⋅
Youtube (Kaspersky)
⋅
Following APT OpSec failures BLACKCOFFEE Mangzamel APT17 |