Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-05-29CitizenLabBill Marczak, John Scott-Railton
Keep Calm and (Don’t) Enable Macros: A New Threat Actor Targets UAE Dissidents
Stealth Falcon
2016-05-27AnomaliAaron Shelmire
Evidence of Stronger Ties Between North Korea and SWIFT Banking Attacks
DYEPACK Sierra(Alfa,Bravo, ...)
2016-05-26SymantecSecurity Response
SWIFT attackers’ malware linked to more financial attacks
Contopee DYEPACK Sierra(Alfa,Bravo, ...) Lazarus Group
2016-05-26Palo Alto Networks Unit 42Bryan Lee, Robert Falcone
The OilRig Campaign: Attacks on Saudi Arabian Organizations Deliver Helminth Backdoor
OilRig
2016-05-26SymantecSymantec Security Response
SWIFT attackers’ malware linked to more financial attacks
Contopee Lazarus Group
2016-05-26Palo Alto Networks Unit 42Bryan Lee, Robert Falcone
The OilRig Campaign: Attacks on Saudi Arabian Organizations Deliver Helminth Backdoor
Helminth
2016-05-24Palo Alto Networks Unit 42Bryan Lee, Josh Grunzweig, Mike Scott
New Wekby Attacks Use DNS Requests As Command and Control Mechanism
Roseam
2016-05-22Palo Alto Networks Unit 42Brandon Levene, Jen Miller-Osborn, Micah Yates, Mike Scott, Tom Keigher
Operation Ke3chang Resurfaces With New TidePool Malware
APT15
2016-05-22Palo Alto Networks Unit 42Brandon Levene, Jen Miller-Osborn, Micah Yates, Mike Scott, Tom Keigher
Operation Ke3chang Resurfaces With New TidePool Malware
Tidepool
2016-05-22FireEyeSudeep Singh, Yin Hong Chang
Targeted Attacks against Banks in the Middle East
Helminth OilRig
2016-05-19BlackberryJim Walter
Petya and Mischa for All! The RaaS Boom Expands to Include the Petya/Mischa Combo
Petya
2016-05-17SymantecJon DiMaggio
Indian organizations targeted in Suckfly attacks
APT22
2016-05-17SymantecJon DiMaggio
Indian organizations targeted in Suckfly attacks
2016-05-12CERT.PLKamil Frankowicz
LatentBot – modularny i silnie zaciemniony bot
LatentBot
2016-05-11FireEyeDan Caselden, Dhanesh Kizhakkinan, Erica Eng, Yu Wang
Threat Actor Leverages Windows Zero-day Exploit in Payment Card Data Attacks
FIN8
2016-05-05SentinelOneJoseph Landry
Sophisticated New Packer Identified in CryptXXX Ransomware Sample
CryptXXXX
2016-05-02Palo Alto Networks Unit 42Simon Conant, Tomer Bar
Prince of Persia: Infy Malware Active In Decade of Targeted Attacks
Infy Infy
2016-05-02Palo Alto Networks Unit 42Simon Conant, Tomer Bar
Prince of Persia: Infy Malware Active In Decade of Targeted Attacks
Infy
2016-05-02Palo Alto Networks Unit 42Simon Conant, Tomer Bar
Prince of Persia: Infy Malware Active In Decade of Targeted Attacks
Infy
2016-05-01Check PointStanislav Skuratovich
Looking into Teslacrypt
TeslaCrypt