Click here to download all references as Bib-File.•
2015-08-05
⋅
Ars Technica
⋅
Newly discovered Chinese hacking group hacked 100+ websites to use as “watering holes” APT27 |
2015-05-04
⋅
Cisco Talos
⋅
Threat Spotlight: Rombertik – Gazing Past the Smoke, Mirrors, and Trapdoors Rombertik |
2015-04-27
⋅
Cisco Talos
⋅
Threat Spotlight: TeslaCrypt – Decrypt It Yourself TeslaCrypt |
2015-03-20
⋅
Cisco Talos
⋅
Threat Spotlight: PoSeidon, A Deep Dive Into Point of Sale Malware FindPOS |
2015-03-19
⋅
Palo Alto Networks Unit 42
⋅
FindPOS: New POS Malware Family Discovered FindPOS |
2014-12-09
⋅
Threatpost
⋅
Linux Modules Connected to Turla APT Discovered Turla |
2014-10-30
⋅
G Data
⋅
COM Object hijacking: the discreet way of persistence COMpfun |
2014-10-28
⋅
Cisco
⋅
Threat Spotlight: Group 72, Opening the ZxShell ZXShell |
2014-10-27
⋅
Netresec
⋅
Full Disclosure of Havex Trojans ENERGETIC BEAR |
2014-10-14
⋅
CrowdStrike
⋅
CrowdStrike Discovers Use of 64-bit Zero-Day Privilege Escalation Exploit (CVE-2014-4113) by Hurricane Panda HURRICANE PANDA |
2014-07-11
⋅
SecurityIntelligence
⋅
The Father of Zeus: Kronos Malware Discovered |
2013-12-04
⋅
Cisco Talos
⋅
The Internet of Everything, Including Malware Zollard |
2013-08-01
⋅
Malwarebytes
⋅
Sophos Discovers ZeroAccess Using RLO ZeroAccess |
2013-05-01
⋅
Cisco
⋅
Linux/CDorked FAQs CDorked |
2012-12-15
⋅
Malware Reversing Blog
⋅
Disclosure of another 0day malware - Initial Dropper and Downloader (Part 1) Coreshell |
2012-12-15
⋅
Disclosure of another 0day malware - Analysis of 2nd Dropper and 3rd Dropper (Part 2) Sedreco |
2012-11-13
⋅
Sophos
⋅
New variant of Mac Trojan discovered, targeting Tibet iMuler |
2012-10-12
⋅
The Mac Security Blog
⋅
New Multiplatform Backdoor Jacksbot Discovered jRAT |
2012-07-24
⋅
The Mac Security Blog
⋅
New Apple Mac Trojan Called OSX/Crisis Discovered Crisis RCS |
2012-07-17
⋅
Kaspersky Labs
⋅
Kaspersky Lab and Seculert Announce ‘Madi,’ a Newly Discovered Cyber-Espionage Campaign in the Middle East Madi |
2011-02-24
⋅
Contagiodump Blog
⋅
ZeroAccess / Max++ / Smiscer Crimeware Rootkit sample for Step-by-Step Reverse Engineering by Giuseppe Bonfa - << (Update 2011 version available) ZeroAccess |
2011-01-01
⋅
Spiegel Online
⋅
SNOWGLOBE: From Discovery to Attribution Babar |
2010-05-27
⋅
SANS ISC InfoSec Forums
⋅
Sasfis Propagation Sasfis |