Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-08-01ESET ResearchGazing at Gazer, Turla’s new second stage backdoor
Gazing at Gazer Turla’s new second stage backdoor
Turla
2017-08-01MalwarebytesMalwarebytes Labs
TrickBot comes up with new tricks: attacking Outlook and browsing data
TrickBot
2017-07-31Palo Alto Networks Unit 42Bryan Lee, Robert Falcone
TwoFace Webshell: Persistent Access Point for Lateral Movement
TwoFace OilRig
2017-07-31ProofpointDarien Huss, Matthew Mesa
FIN7/Carbanak threat actor unleashes Bateleur JScript backdoor
Bateleur FIN7
2017-07-27ForbesThomas Brewster
With Fake News And Femmes Fatales, Iran's Spies Learn To Love Facebook
Charming Kitten
2017-07-27Security IntelligenceLimor Kessem, Shachar Gritzman
After Big Takedown Efforts, 20 More BankBot Mobile Malware Apps Make It Into Google Play
Anubis
2017-07-25Ars TechnicaDan Goodin
“Perverse” malware infecting hundreds of Macs remained undetected for years
FruitFly
2017-07-25Palo Alto Networks Unit 42Kaoru Hayashi
“Tick” Group Continues Attacks
Daserf Tick
2017-07-25GigamonApplied Threat Research Team
Footprints of Fin7: Tracking Actor Patterns (Part 1)
FIN7
2017-07-24VolexityVolexity
Real News, Fake Flash: Mac OS X Users Targeted
Leverage
2017-07-24Kaspersky LabsNoushin Shabab
Spring Dragon – Updated Activity
LOTUS PANDA
2017-07-20ESET ResearchFrédéric Vachon, Matthieu Faou
Stantinko: A massive adware campaign operating covertly since 2012
Stantinko
2017-07-19SecurityWeekEduard Kovacs
'DarkHotel' APT Uses New Methods to Target Politicians
DarkHotel
2017-07-18Trend MicroBrian Cayanan, Mohamad Mokbel, Tim Yeh
Linux Users Urged to Update as a New Threat Exploits SambaCry
ShellBind
2017-07-17MalwarebytesThreat Intelligence Team
It’s baaaack: Public cyber enemy Emotet has returned
Emotet
2017-07-17Trend MicroCedric Pernet, Jordan Pan, Lenart Bermejo
Android Backdoor GhostCtrl can Silently Record Your Audio, Video, and More
GhostCtrl
2017-07-12WiredLily Hay Newman
Iranian Hackers Have Been Infiltrating Critical Infrastructure Companies
OilRig
2017-07-11Trend MicroMarshall Chen, Rubio Wu
Spam Campaign Delivers Cross-platform Remote Access Trojan Adwind
AdWind
2017-07-07SWITCH Security BlogMichael Hausding
94 .ch & .li domain names hijacked and used for drive-by
Neutrino
2017-07-05Seebug PaperADLab
Trump Zombies: New IoT Zombies Attacking 'In Trump's Name'
Trump Bot