Click here to download all references as Bib-File.•
2018-05-01
⋅
Sophos
⋅
VPNFilter Botnet - a SophosLabs Analysis VPNFilter |
2018-04-01
⋅
Sophos
⋅
SamSam Ransomware Chooses Its Targets Carefully SamSam |
2018-04-01
⋅
Sophos
⋅
SamSam Ransomware Chooses Its Targets Carefully SamSam |
2018-01-31
⋅
Sophos Naked Security
⋅
What are “WannaMine” attacks, and how do I avoid them? WannaMine |
2017-06-26
⋅
Sophos
⋅
How Spora ransomware tries to fool antivirus Spora |
2017-02-27
⋅
Sophos
⋅
Betabot: Configuration Data Extraction BetaBot |
2016-02-29
⋅
Sophos
⋅
The “HawkEye” attack: how cybercrooks target small businesses for big money HawkEye Keylogger |
2015-11-02
⋅
Sophos
⋅
Troj/Cryakl-B Cryakl |
2014-06-27
⋅
SophosLabs
⋅
PlugX - The Next Generation PlugX |
2014-01-21
⋅
Sophos Naked Security
⋅
Digitally signed data-stealing malware targets Mac users in “undelivered courier item” attack Laoshu |
2013-08-01
⋅
Malwarebytes
⋅
Sophos Discovers ZeroAccess Using RLO ZeroAccess |
2013-03-05
⋅
Sophos Naked Security
⋅
Russian ransomware takes advantage of Windows PowerShell FTCODE |
2012-11-27
⋅
Sophos
⋅
Threat Description: Troj/Ployx-A ployx |
2012-11-13
⋅
Sophos
⋅
New variant of Mac Trojan discovered, targeting Tibet iMuler |
2012-08-30
⋅
Sophos
⋅
Troj/Binanen-B Binanen |
2011-04-16
⋅
Sophos
⋅
Troj/Sasfis-O Sasfis |
2010-07-24
⋅
Sophos
⋅
Why won’t my sample run? Zeus |
2009-04-01
⋅
Sophos Labs
⋅
Conficker.C A Technical Analysis |
2009-04-01
⋅
Sophos Labs
⋅
Conficker.C A Technical Analysis |