Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-09-13CiscoJosh Reynolds
H1N1: Technical analysis reveals new capabilities
H1N1 Loader
2016-09-08Dr.WebDr.Web
Doctor Web discovers Linux Trojan written in Rust
Irc16
2016-09-07Kaspersky LabsStefan Ortloff
The Missing Piece – Sophisticated OS X Backdoor Discovered
Mokes
2016-07-28BlackberryJim Walter
Petya and Mischa For All Part II: They’re Here…
Petya
2016-07-12Joseph Landry, Udi Shamir
Malware Discovered – SFG: Furtim Malware Analysis
2016-06-10Malwarebytes Labshasherezade
Petya and Mischa: ransomware duet (part 2)
Petya
2016-05-19BlackberryJim Walter
Petya and Mischa for All! The RaaS Boom Expands to Include the Petya/Mischa Combo
Petya
2016-05-19Malwarebyteshasherezade
Petya and Mischa – Ransomware Duet (Part 1)
Petya
2016-04-28Cisco TalosBen Baker
Research Spotlight: The Resurgence of Qbot
QakBot
2016-03-23Cisco TalosCisco Talos
SamSam: The Doctor Will See You, After He Pays The Ransom
SamSam
2016-01-29Kaspersky LabsStefan Ortloff
From Linux to Windows – New Family of Cross-Platform Desktop Backdoors Discovered
Mokes Mokes
2015-11-04AvastNikolaos Chrysaidos
DroidJack isn’t the only spying software out there: Avast discovers OmniRat
OmniRAT
2015-10-06enSiloYotam Gottesman
MOKER: A NEW APT DISCOVERED WITHIN A SENSITIVE NETWORK
Moker
2015-08-05Ars TechnicaSean Gallagher
Newly discovered Chinese hacking group hacked 100+ websites to use as “watering holes”
APT27
2015-05-04Cisco TalosAlex Chiu, Ben Baker
Threat Spotlight: Rombertik – Gazing Past the Smoke, Mirrors, and Trapdoors
Rombertik
2015-04-27Cisco TalosAndrea Allievi, Earl Carter, Emmanuel Tacheau
Threat Spotlight: TeslaCrypt – Decrypt It Yourself
TeslaCrypt
2015-03-20Cisco TalosAlain Zidouemba, Andrea Allievi, Angel Villegas, Ben Baker, Douglas Goddard, JJ Cummings, Nick Biasini, William Largent
Threat Spotlight: PoSeidon, A Deep Dive Into Point of Sale Malware
FindPOS
2015-03-19Palo Alto Networks Unit 42Josh Grunzweig
FindPOS: New POS Malware Family Discovered
FindPOS
2014-12-09ThreatpostMichael Mimoso
Linux Modules Connected to Turla APT Discovered
Turla
2014-10-30G DataG Data
COM Object hijacking: the discreet way of persistence
COMpfun