Click here to download all references as Bib-File.•
2018-02-02
⋅
Malwarebytes
⋅
New Mac cryptominer distributed via a MacUpdate hack CreativeUpdater |
2018-01-31
⋅
Sophos Naked Security
⋅
What are “WannaMine” attacks, and how do I avoid them? WannaMine |
2018-01-27
⋅
Accenture Security
⋅
LATEST CYBER ESPIONAGE MALWARE ATTACKS - DRAGONFISH DELIVERS NEW FORM OF ELISE MALWARE TARGETING ASEAN DEFENCE MINISTERS’ MEETING AND ASSOCIATES Elise |
2018-01-26
⋅
Palo Alto Networks Unit 42
⋅
The TopHat Campaign: Attacks Within The Middle East Region Using Popular Third-Party Services Scote |
2018-01-26
⋅
Bleeping Computer
⋅
The Velso Ransomware Being Manually Installed by Attackers Velso |
2018-01-25
⋅
Palo Alto Networks Unit 42
⋅
OilRig uses RGDoor IIS Backdoor on Targets in the Middle East OilRig |
2018-01-25
⋅
Palo Alto Networks Unit 42
⋅
OilRig uses RGDoor IIS Backdoor on Targets in the Middle East RGDoor |
2018-01-23
⋅
Möbius Strip Reverse Engineering
⋅
A Walk-Through Tutorial, with Code, on Statically Unpacking the FinSpy VM: Part One, x86 Deobfuscation FinFisher RAT |
2018-01-23
⋅
RiskIQ
⋅
Espionage Campaign Leverages Spear Phishing, RATs Against Turkish Defense Contractors Remcos |
2018-01-22
⋅
Acronis
⋅
Paradise Ransomware strikes again Paradise |
2018-01-22
⋅
ZDNet
⋅
This hacking gang just updated the malware it uses against UK targets Turla |
2018-01-18
⋅
Lookout
⋅
Dark Caracal: Cyber-espionage at a Global Scal CrossRAT Bandook Dark Caracal |
2018-01-17
⋅
360 netlab
⋅
Art of Steal: Satori Variant is Robbing ETH BitCoin by Replacing Wallet Address Satori |
2018-01-16
⋅
Kaspersky Labs
⋅
Skygofree: Following in the footsteps of HackingTeam Skygofree |
2018-01-16
⋅
RiskIQ
⋅
First Activities of Cobalt Group in 2018: Spear Phishing Russian Banks Cobalt |
2018-01-15
⋅
Acronis
⋅
GlobeImposter ransomware: A holiday gift from the Necurs botnet GlobeImposter |
2018-01-15
⋅
VirIT
⋅
Bootkits are not dead. Pitou is back! Pitou |
2018-01-13
⋅
The Washington Post
⋅
Russian military was behind ‘NotPetya’ cyberattack in Ukraine, CIA concludes EternalPetya |
2018-01-12
⋅
Medium
⋅
Sonja Analysis Snojan |
2018-01-12
⋅
Stormshield
⋅
Analyzing an Agent Tesla campaign: from a word document to the attacker credentials Agent Tesla |