Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-07-19SecurityWeekEduard Kovacs
'DarkHotel' APT Uses New Methods to Target Politicians
DarkHotel
2017-07-18Trend MicroBrian Cayanan, Mohamad Mokbel, Tim Yeh
Linux Users Urged to Update as a New Threat Exploits SambaCry
ShellBind
2017-07-17MalwarebytesThreat Intelligence Team
It’s baaaack: Public cyber enemy Emotet has returned
Emotet
2017-07-17Trend MicroCedric Pernet, Jordan Pan, Lenart Bermejo
Android Backdoor GhostCtrl can Silently Record Your Audio, Video, and More
GhostCtrl
2017-07-12WiredLily Hay Newman
Iranian Hackers Have Been Infiltrating Critical Infrastructure Companies
OilRig
2017-07-11Trend MicroMarshall Chen, Rubio Wu
Spam Campaign Delivers Cross-platform Remote Access Trojan Adwind
AdWind
2017-07-07SWITCH Security BlogMichael Hausding
94 .ch & .li domain names hijacked and used for drive-by
Neutrino
2017-07-05Seebug PaperADLab
Trump Zombies: New IoT Zombies Attacking 'In Trump's Name'
Trump Bot
2017-07-05Trend MicroMobile Threat Response Team
SLocker Mobile Ransomware Starts Mimicking WannaCry
Slocker
2017-07-05Trend MicroKevin Y. Huang
Security 101: The Impact of Cryptocurrency-Mining Malware
PurpleFox
2017-07-04ESET ResearchAnton Cherepanov
Analysis of TeleBots’ cunning backdoor
TeleDoor
2017-07-03ESET ResearchAnton Cherepanov, Robert Lipovsky
BlackEnergy – what we really know about the notorious cyber attacks
BlackEnergy
2017-07-03The GuardianAlex Hern
'NotPetya' malware attacks could warrant retaliation, says Nato affiliated-researcher
EternalPetya
2017-07-02CERT.PLMaciej Kotowicz
ISFB: Still Live and Kicking
ISFB
2017-06-30ESET ResearchAnton Cherepanov
TeleBots are back: Supply‑chain attacks against Ukraine
TeleBot Sandworm
2017-06-30MalwarebytesMalwarebytes Labs
EternalPetya – yet another stolen piece in the package?
EternalPetya
2017-06-30ESET ResearchAnton Cherepanov
TeleBots are back: Supply‑chain attacks against Ukraine
EternalPetya
2017-06-30FireEyeDaniel Bohannon, Nick Carr
Obfuscation in the Wild: Targeted Attackers Lead the Way in Evasion Techniques
FIN8
2017-06-30Kaspersky LabsGReAT
From BlackEnergy to ExPetr
EternalPetya
2017-06-29MicrosoftMicrosoft Defender ATP Research Team
Windows 10 platform resilience against the Petya ransomware attack
EternalPetya