Click here to download all references as Bib-File.
2016-10-16 ⋅ RapidityNetworks ⋅ Hajime: Analysis of a decentralizedinternet worm for IoT devices Hajime |
2016-10-01 ⋅ Vice Motherboard ⋅ ‘Shadow Brokers’ Whine That Nobody Is Buying Their Hacked NSA Files The Shadow Brokers |
2016-09-13 ⋅ Palo Alto Networks Unit 42 ⋅ DualToy: New Windows Trojan Sideloads Risky Apps to Android and iOS Devices DualToy DualToy |
2016-09-13 ⋅ Palo Alto Networks Unit 42 ⋅ DualToy: New Windows Trojan Sideloads Risky Apps to Android and iOS Devices DualToy |
2016-02-18 ⋅ Palo Alto Networks Unit 42 ⋅ New Android Trojan “Xbot” Phishes Credit Cards and Bank Accounts, Encrypts Devices for Ransom Xbot |
2015-11-06 ⋅ SecurityIntelligence ⋅ OmniRAT Takes Over Android Devices Through Social Engineering Tricks OmniRAT |
2015-09-23 ⋅ SpiderLabs Blog ⋅ Quaverse RAT: Remote-Access-as-a-Service QRat |
2015-07-22 ⋅ F-Secure ⋅ Duke APT group's latest tools: cloud services and Linux support CloudDuke |
2015-07-05 ⋅ Vice ⋅ Spy Tech Company 'Hacking Team' Gets Hacked Hacking Team |
2015-02-18 ⋅ Vice Motherboard ⋅ Meet Babar, a New Malware Almost Certainly Created by France SNOWGLOBE |
2014-11-13 ⋅ Trend Micro ⋅ BASHLITE Affects Devices Running on BusyBox Bashlite |
2013-11-06 ⋅ CrowdStrike ⋅ VICEROY TIGER Delivers New Zero-Day Exploit VICEROY TIGER |
2013-08-25 ⋅ AusCERT ⋅ The Compromised Devices of the Carna Botnet |
2012-11-16 ⋅ Github (DesignativeDave) ⋅ Remote Administration Tool for Android devices AndroRAT |
2012-01-13 ⋅ Middle East Online ⋅ Cyber war: 'Gaza hackers' deface Israel fire service website Molerats |
2011-10-26 ⋅ Intego ⋅ Tsunami Backdoor Can Be Used for Denial of Service Attacks Tsunami |
2011-02-10 ⋅ McAfee ⋅ Global Energy Cyberattacks: “Night Dragon” Night Dragon |
2010-11-20 ⋅ InfoSec Institute ⋅ The Kernel-Mode Device Driver Stealth Rootkit ZeroAccess |
2010-11-16 ⋅ ZEROACCESS MALWARE - PART 3: The Device Driver Process Injection Rootkit ZeroAccess |