Click here to download all references as Bib-File.•
| 2017-01-19
            
            ⋅
            
            Bleeping Computer
            ⋅
            
             New Satan Ransomware available through a Ransomware as a Service. Satan  | 
| 2016-12-20
            
            ⋅
            
            ESET Research
            ⋅
            
             New Linux/Rakos threat: devices and servers under SSH scan (again) Rakos  | 
| 2016-12-20
            
            ⋅
            
            ESET Research
            ⋅
            
             New Linux/Rakos threat: devices and servers under SSH scan (again)  | 
| 2016-12-01
            
            ⋅
            
            US-CERT
            ⋅
            
             Alert (TA16-336A): Avalanche (crimeware-as-a-service infrastructure) GootKit  | 
| 2016-11-30
            
            ⋅
            
            Fortinet
            ⋅
            
             Bladabindi Remains A Constant Threat By Using Dynamic DNS Services NjRAT  | 
| 2016-10-16
            
            ⋅
            
            RapidityNetworks
            ⋅
            
             Hajime: Analysis of a decentralizedinternet worm for IoT devices Hajime  | 
| 2016-10-01
            
            ⋅
            
            Vice Motherboard
            ⋅
            
             ‘Shadow Brokers’ Whine That Nobody Is Buying Their Hacked NSA Files The Shadow Brokers  | 
| 2016-09-13
            
            ⋅
            
            Palo Alto Networks Unit 42
            ⋅
            
             DualToy: New Windows Trojan Sideloads Risky Apps to Android and iOS Devices DualToy  | 
| 2016-09-13
            
            ⋅
            
            Palo Alto Networks Unit 42
            ⋅
            
             DualToy: New Windows Trojan Sideloads Risky Apps to Android and iOS Devices DualToy DualToy  | 
| 2016-02-18
            
            ⋅
            
            Palo Alto Networks Unit 42
            ⋅
            
             New Android Trojan “Xbot” Phishes Credit Cards and Bank Accounts, Encrypts Devices for Ransom Xbot  | 
| 2015-11-06
            
            ⋅
            
            SecurityIntelligence
            ⋅
            
             OmniRAT Takes Over Android Devices Through Social Engineering Tricks OmniRAT  | 
| 2015-09-23
            
            ⋅
            
            SpiderLabs Blog
            ⋅
            
             Quaverse RAT: Remote-Access-as-a-Service QRat  | 
| 2015-07-22
            
            ⋅
            
            F-Secure
            ⋅
            
             Duke APT group's latest tools: cloud services and Linux support CloudDuke  | 
| 2015-07-05
            
            ⋅
            
            Vice
            ⋅
            
             Spy Tech Company 'Hacking Team' Gets Hacked Hacking Team  | 
| 2015-02-18
            
            ⋅
            
            Vice Motherboard
            ⋅
            
             Meet Babar, a New Malware Almost Certainly Created by France SNOWGLOBE  | 
| 2014-11-13
            
            ⋅
            
            Trend Micro
            ⋅
            
             BASHLITE Affects Devices Running on BusyBox Bashlite  | 
| 2013-11-06
            
            ⋅
            
            CrowdStrike
            ⋅
            
             VICEROY TIGER Delivers New Zero-Day Exploit VICEROY TIGER  | 
| 2013-08-25
            
            ⋅
            
            AusCERT
            ⋅
            
             The Compromised Devices of the Carna Botnet  | 
| 2012-11-16
            
            ⋅
            
            Github (DesignativeDave)
            ⋅
            
             Remote Administration Tool for Android devices AndroRAT  | 
| 2012-01-13
            
            ⋅
            
            Middle East Online
            ⋅
            
             Cyber war: 'Gaza hackers' deface Israel fire service website Molerats  | 
| 2011-10-26
            
            ⋅
            
            Intego
            ⋅
            
             Tsunami Backdoor Can Be Used for Denial of Service Attacks Tsunami  | 
| 2011-02-10
            
            ⋅
            
            McAfee
            ⋅
            
             Global Energy Cyberattacks: “Night Dragon” Night Dragon  | 
| 2010-11-20
            
            ⋅
            
            InfoSec Institute
            ⋅
            
             The Kernel-Mode Device Driver Stealth Rootkit ZeroAccess  | 
| 2010-11-16
            
            ⋅
            
             ZEROACCESS MALWARE - PART 3: The Device Driver Process Injection Rootkit ZeroAccess  |