Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-05-15Trend MicroMartin Roesler
What We Can Learn From the Bangladesh Central Bank Cyber Heist
Lazarus Group
2016-05-12Trend MicroJasen Sumalapao, Lion Gu
Chinese-language Ransomware ‘SHUJIN’ Makes An Appearance
Shujin
2016-03-14Trend MicroJoseph C. Chen
Massive Malvertising Campaign in US Leads to Angler Exploit Kit/BEDEP
2016-03-01Trend MicroRazor Huang
Shrouded Crossbow Creators Behind BIFROSE for UNIX
KIVARS
2016-03-01Trend MicroDavid Sancho, Feike Hacquebord
Operation C-Major: Information Theft Campaign Targets Military Personnel in India
Operation C-Major
2015-12-01Trend MicroErika Mendoza, Jay Yaneza
Operation Black Atlas Endangers In-Store Card Payments and SMBs Worldwide; Switches between BlackPOS and Other Tools
Alina POS BlackPOS Kronos NewPosThings
2015-10-22Trend MicroFeike Hacquebord
Pawn Storm Targets MH17 Investigation Team
APT28
2015-10-13Trend MicroBrooks Li, Feike Hacquebord, Peter Pi
New Adobe Flash Zero-Day Used in Pawn Storm Campaign Targeting Foreign Affairs Ministries
APT28
2015-10-13Trend MicroBrooks Li, Feike Hacquebord, Peter Pi
New Adobe Flash Zero-Day Used in Pawn Storm Campaign Targeting Foreign Affairs Ministries
Seduploader
2015-09-28Trend MicroTrend Micro Forward Looking Research Team
Two New PoS Malware Affecting US SMBs
Alina POS
2015-09-24Trend MicroMichael Marcos, RonJay Caragay
Credit Card-Scraping Kasidet Builder Leads to Spike in Detections
Neutrino
2015-09-17Trend MicroTrendmicro
Operation Iron Tiger: Exploring Chinese Cyber-Espionage Attacks on United States Defense Contractors
APT27
2015-09-16Trend MicroChristopher Budd
Operation Iron Tiger: Attackers Shift from East Asia to the United States
APT27
2015-09-01Trend MicroCedric Pernet, Eyal Sela
The Spy Kittens Are Back:Rocket Kitten 2
Cleaver
2015-09-01Trend MicroCedric Pernet, Eyal Sela
The Spy Kittens Are Back: Rocket Kitten 2
Rocket Kitten
2015-09-01Trend MicroBenson Sy
Attackers Target Organizations in Japan; Transform Local Sites into C&C Servers for EMDIVI Backdoor
Emdivi
2015-07-16Trend MicroJay Yaneza
GamaPoS: The Andromeda Botnet Connection
gamapos
2015-07-01Trend MicroJay Yaneza
GamaPoS
winlog
2015-06-01Trend MicroJay Yaneza
MalumPOS History and Characteristics
MalumPOS
2015-05-13Trend MicroKervin Alintanahin
Operation Tropic Trooper
APT23