Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-10-24Lastlinelastline Labs Team
Evasive Malware Detects and Defeats Virtual Machine Analysis
2016-10-21ForcepointRolanda Dela Paz
BITTER: a targeted attack against Pakistan
Bitter RAT
2016-10-17Palo Alto Networks Unit 42Bryan Lee, Robert Falcone
‘DealersChoice’ is Sofacy’s Flash Player Exploit Platform
APT28
2016-10-11SymantecSymantec Security Response
Odinaff: New Trojan used in high level financial attacks
Batel FlawedAmmyy Odinaff RMS FIN7
2016-10-11SymantecSymantec Security Response
Odinaff: New Trojan used in high level financial attacks
Cobalt Strike KLRD MimiKatz Odinaff
2016-10-10BBCGordon Corera
How France's TV5 was almost destroyed by 'Russian hackers'
APT28
2016-10-07FireEyeMatt Bromiley, Preston Lewis
Attacking the Hospitality and Gaming Industries: Tracking an Attacker Around the World in 7 Years
RawPOS
2016-10-06Virus BulletinKurt Baumgartner
On the StrongPity Waterhole Attacks Targeting Italian and Belgian Encryption Users
PROMETHIUM
2016-10-03Kaspersky LabsKurt Baumgartner
On the StrongPity Waterhole Attacks Targeting Italian and Belgian Encryption Users
StrongPity
2016-10-01Vice MotherboardJanus Rose
‘Shadow Brokers’ Whine That Nobody Is Buying Their Hacked NSA Files
The Shadow Brokers
2016-09-30Bleeping ComputerLawrence Abrams
Hacked Steam accounts spreading Remote Access Trojan
NetSupportManager RAT
2016-09-28ForcepointNicholas Griffin
Highly Evasive Code Injection Awaits User Interaction Before Delivering Malware
BuhTrap
2016-09-27MalwarebytesThomas Reed
Komplex Mac backdoor answers old questions
Komplex
2016-09-26Palo Alto Networks Unit 42Dani Creus, Robert Falcone, Tyler Halfpop
Sofacy’s ‘Komplex’ OS X Trojan
APT28
2016-09-26Palo Alto Networks Unit 42Dani Creus, Robert Falcone, Tyler Halfpop
Sofacy’s ‘Komplex’ OS X Trojan
Komplex
2016-09-23SecurityIntelligenceDave McMillen
Dissecting a Hacktivist’s DDoS Tool: Saphyra Revealed
Saphyra
2016-09-23FireEyeAnkit Anubhav, Dileep Kumar Jallepalli
Hancitor (AKA Chanitor) observed using multiple attack approaches
Hancitor
2016-09-23Laanwj's Blog@orionwl
SECONDDATE in action
Equationgroup (Sorting)
2016-09-22ESET ResearchAnton Cherepanov
Book of Eli: African targeted attacks
Book of Eli
2016-09-20Deutsche Welleipj, kl
Hackers lurking, parliamentarians told
APT28