Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-11-08FreebufSecurity Leopard
Analysis of an active USB flash drive virus
MyloBot
2017-11-07Trend MicroJoey Chen, MingYen Hsieh
REDBALDKNIGHT/BRONZE BUTLER’s Daserf Backdoor Now Using Steganography
Tick
2017-11-07Trend MicroTrendmicro
REDBALDKNIGHT/BRONZE BUTLER’s Daserf Backdoor Now Using Steganography
Daserf Datper xxmm
2017-11-02PWC UKBart Parys
The KeyBoys are back in town
KeyBoy
2017-11-02RiskIQYonathan Klijnsma
New Insights into Energetic Bear’s Watering Hole Cyber Attacks on Turkish Critical Infrastructure
ENERGETIC BEAR
2017-11-02Palo Alto Networks Unit 42Jacob Soo, Josh Grunzweig
Recent InPage Exploits Lead to Multiple Malware Families
Confucius
2017-11-02TalosEarl Carter, Edmund Brumaghin, Emmanuel Tacheau
Poisoning the Well: Banking Trojan Targets Google Search Results
PandaBanker
2017-11-02Palo Alto Networks Unit 42Jacob Soo, Josh Grunzweig
Recent InPage Exploits Lead to Multiple Malware Families
BioData
2017-11-01Bleeping ComputerCatalin Cimpanu
CryptoShuffler Stole $150,000 by Replacing Bitcoin Wallet IDs in PC Clipboards
CryptoShuffler
2017-11-01Kaspersky LabsGReAT
Silence – a new Trojan attacking financial organizations
Silence Silence group
2017-10-31McAfeeXiaobing Lin
Expiro Malware Is Back and Even Harder to Remove
Expiro
2017-10-31Bleeping ComputerLawrence Abrams
ONI Ransomware Used in Month-Long Attacks Against Japanese Companies
Oni
2017-10-30Kaspersky LabsGhareeb Saad, Mohamad Amin Hasbini
Gaza Cybergang – updated activity in 2017:
Molerats
2017-10-30ESET ResearchFrédéric Vachon
Windigo Still not Windigone: An Ebury Update
Ebury
2017-10-29quangnh89
Sality Configuration Extractor (sality_extractor.py)
Sality
2017-10-27Palo Alto Networks Unit 42Unit42
Tracking Subaat: Targeted Phishing Attack Leads to Threat Actor’s Repository
The Gorgon Group
2017-10-27Independent.co.ukAdam Withnall
British security minister says North Korea was behind WannaCry hack on NHS
WannaCryptor
2017-10-27Palo Alto Networks Unit 42Unit 42
Tracking Subaat: Targeted Phishing Attack Leads to Threat Actor’s Repository
2017-10-26RiskIQYonathan Klijnsma
New htpRAT Gives Complete Remote Control Capabilities to Chinese Cyber Threat Actors
htpRAT
2017-10-26MacworldLiviu Arsene
Keranger: the first “in-the-wild” ransomware for Macs. But certainly not the last
KeRanger