Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-08-29FortinetFloser Bacurio Jr., Joie Salvio
German Speakers Targeted by SPAM Leading to Ozone RAT
Ozone RAT
2016-08-25MalwarebytesMalwarebytes Labs
Unpacking the spyware disguised as antivirus
PlugX
2016-08-23International Business TimesHyacinth Mascarenhas
Russian hackers 'Fancy Bear' likely breached Olympic drug-testing agency and DNC, experts say
APT28
2016-08-23International Business TimesHyacinth Mascarenhas
Russian hackers 'Fancy Bear' likely breached Olympic drug-testing agency and DNC, experts say
2016-08-17Kaspersky LabsMohamad Amin Hasbini
Operation Ghoul: targeted attacks on industrial and engineering organizations
OpGhoul Operation Ghoul
2016-08-17Kaspersky LabsMohamad Amin Hasbini
Operation Ghoul: targeted attacks on industrial and engineering organizations
OpGhoul
2016-08-10CERT.PLKamil Frankowicz
CryptXXX \ CrypMIC – intensywnie dystrybuowany ransomware w ramach exploit-kitów
CrypMic CryptXXXX
2016-08-08Kaspersky LabsGReAT
ProjectSauron: top level cyber-espionage platform covertly extracts encrypted government comms
ProjectSauron
2016-08-08SymantecSymantec
Backdoor.Remsec indicators of compromise
Remsec
2016-08-04SecurityWeekSecurityWeek News
Iranian Actor "Group5" Targeting Syrian Opposition
Group5
2016-08-01CrowdStrikeAdam Meyers
CrowdStrike’s New Methodology for Tracking eCrime
Corebot BOSON SPIDER
2016-08-01UperesiaFelix Weyne
Analysis of a packed Pony downloader
Pony
2016-08-01ESET ResearchESET Research
En Route with Sednit - Part 1: Approaching the Target
Komplex Seduploader
2016-08-01Black HatClaudio Guarnieri, Collin Anderson
Iran and the Soft Warfor Internet Dominance
Infy Sima
2016-07-31Security AffairsPierluigi Paganini
China 1937CN Team Hackers Attack Airports in Vietnam
1937CN
2016-07-28BlackberryJim Walter
Petya and Mischa For All Part II: They’re Here…
Petya
2016-07-26Palo Alto Networks Unit 42Jen Miller-Osborn, Robert Falcone
Attack Delivers ‘9002’ Trojan Through Google Drive
2016-07-26ProofpointProofpoint
Threat Actors Using Legitimate PayPal Accounts To Distribute Chthonic Banking Trojan
Azorult Chthonic
2016-07-21McAfeeMohinder Gill, Oliver Devane
Phishing Attacks Employ Old but Effective Password Stealer
ISR Stealer
2016-07-12Fidelis CybersecurityThreat Research Team
Me and Mr. Robot: Tracking the Actor Behind the MAN1 Crypter
Hancitor Vawtrak