Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-11-30FortinetLilia Elena Gonzalez Medina
Bladabindi Remains A Constant Threat By Using Dynamic DNS Services
NjRAT
2016-10-16RapidityNetworksIoannis Profetis, Sam Edwards
Hajime: Analysis of a decentralizedinternet worm for IoT devices
Hajime
2016-10-01Vice MotherboardJanus Rose
‘Shadow Brokers’ Whine That Nobody Is Buying Their Hacked NSA Files
The Shadow Brokers
2016-09-13Palo Alto Networks Unit 42Claud Xiao
DualToy: New Windows Trojan Sideloads Risky Apps to Android and iOS Devices
DualToy
2016-09-13Palo Alto Networks Unit 42Claud Xiao
DualToy: New Windows Trojan Sideloads Risky Apps to Android and iOS Devices
DualToy DualToy
2016-02-18Palo Alto Networks Unit 42Claud Xiao, Cong Zheng, Zhi Xu
New Android Trojan “Xbot” Phishes Credit Cards and Bank Accounts, Encrypts Devices for Ransom
Xbot
2015-11-06SecurityIntelligenceShane Schick
OmniRAT Takes Over Android Devices Through Social Engineering Tricks
OmniRAT
2015-09-23SpiderLabs BlogRodel Mendrez
Quaverse RAT: Remote-Access-as-a-Service
QRat
2015-07-22F-SecureArtturi Lehtiö
Duke APT group's latest tools: cloud services and Linux support
CloudDuke
2015-07-05ViceLorenzo Franceschi-Bicchierai
Spy Tech Company 'Hacking Team' Gets Hacked
Hacking Team
2015-02-18Vice MotherboardLorenzo Franceschi-Bicchierai
Meet Babar, a New Malware Almost Certainly Created by France
SNOWGLOBE
2014-11-13Trend MicroRhena Inocencio
BASHLITE Affects Devices Running on BusyBox
Bashlite
2013-11-06CrowdStrikeAdam Meyers
VICEROY TIGER Delivers New Zero-Day Exploit
VICEROY TIGER
2013-08-25AusCERTParth Shukla
The Compromised Devices of the Carna Botnet
2012-11-16Github (DesignativeDave)DesignativeDave
Remote Administration Tool for Android devices
AndroRAT
2012-01-13Middle East OnlineMiddle East Online
Cyber war: 'Gaza hackers' deface Israel fire service website
Molerats
2011-10-26IntegoPeter James
Tsunami Backdoor Can Be Used for Denial of Service Attacks
Tsunami
2011-02-10McAfeeMcAfee Foundstone Professional Services, McAfee Labs
Global Energy Cyberattacks: “Night Dragon”
Night Dragon
2010-11-20InfoSec InstituteGiuseppe Bonfa
The Kernel-Mode Device Driver Stealth Rootkit
ZeroAccess
2010-11-16Giuseppe Bonfa
ZEROACCESS MALWARE - PART 3: The Device Driver Process Injection Rootkit
ZeroAccess