Click here to download all references as Bib-File.•
2016-01-18
⋅
Proofpoint
⋅
Updated Blackmoon banking Trojan stays focused on South Korean banking customers KrBanker |
2015-12-16
⋅
ESET Research
⋅
Nemucod malware spreads ransomware Teslacrypt around the world TeslaCrypt |
2015-12-01
⋅
Trend Micro
⋅
Operation Black Atlas Endangers In-Store Card Payments and SMBs Worldwide; Switches between BlackPOS and Other Tools Alina POS BlackPOS Kronos NewPosThings |
2015-10-09
⋅
Palo Alto Networks Unit 42
⋅
Latest TeslaCrypt Ransomware Borrows Code From Carberp Trojan TeslaCrypt |
2015-10-08
⋅
Cylance
⋅
A Study in Bots: DiamondFox DiamondFox |
2015-09-11
⋅
Raytheon Blackbird Technologies
⋅
20150911-280-CSIT-15085 NfLog IsSpace |
2015-08-24
⋅
DarkMatters
⋅
Sphinx: New Zeus Variant for Sale on the Black Market Zeus Sphinx |
2015-08-14
⋅
Raytheon Blackbird Technologies
⋅
Stalker Panda Tick |
2015-08-06
⋅
Symantec
⋅
The Black Vine cyberespionage group Sakula RAT APT19 |
2015-08-06
⋅
Symantec
⋅
The Black Vine cyberespionage group |
2015-08-05
⋅
Black Hat
⋅
Gameover Zeus – Bad Guys and Backends Gameover P2P |
2015-07-14
⋅
Kaspersky Labs
⋅
TeslaCrypt 2.0 disguised as CryptoWall TeslaCrypt |
2015-04-27
⋅
Cisco Talos
⋅
Threat Spotlight: TeslaCrypt – Decrypt It Yourself TeslaCrypt |
2014-10-14
⋅
ESET Research
⋅
CVE‑2014‑4114: Details on August BlackEnergy PowerPoint Campaigns BlackEnergy |
2014-08-29
⋅
Trend Micro
⋅
New BlackPOS Malware Emerges in the Wild, Targets Retail Accounts BlackPOS |
2014-08-29
⋅
FireEye
⋅
Connecting the Dots: Syrian Malware Team Uses BlackWorm for Attacks Blackworm RAT |
2014-05-30
⋅
Malwarebytes
⋅
Taking off the Blackshades BlackShades |
2013-07-19
⋅
BlackHat
⋅
End-to-End Analysis of a Domain Generating Algorithm Malware Family SuppoBox |
2013-04-26
⋅
ESET Research
⋅
Linux/Cdorked.A: New Apache backdoor being used in the wild to serve Blackhole CDorked |
2013-02-08
⋅
VMWare Carbon Black
⋅
Bit9 and Our Customers’ Security APT17 |