Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-04-27Kaspersky LabsGReAT
Freezer Paper around Free Meat (Repackaging Open Source BeEF for Tracking and More)
Charming Kitten
2016-04-26MicrosoftWindows Defender Advanced Threat Hunting Team
PLATINUM Targeted attacks in South and Southeast Asia
AMTsol PLATINUM
2016-04-26Github (CyberMonitor)Jason Jones
New Poison Ivy Activity Targeting Myanmar, Asian Countries
Poison Ivy
2016-04-25Threat PostChris Brook
Attackers Behind GozNym Trojan Set Sights on Europe
GozNym
2016-04-22CylanceIsaac Palmer
The Ghost Dragon
Ghost RAT
2016-04-22Palo Alto Networks Unit 42Brandon Levene, Jen Miller-Osborn, Micah Yates, Mike Scott
New Poison Ivy RAT Variant Targets Hong Kong Pro-Democracy Activists
Poison Ivy
2016-04-21ThreatpostTom Spring
PoS Attacks Net Crooks 20 Million Stolen Bank Cards
Vawtrak
2016-04-19EndgameMark Mager
Your Package Has Been Successfully Encrypted: TeslaCrypt 4.1A and the Malware Attack Chain
TeslaCrypt
2016-04-19FireEyeCian Lynch, Claudiu Teodorescu, Dimiter Andonov
MULTIGRAIN – Point of Sale Attackers Make an Unhealthy Addition to the Pantry
Multigrain POS
2016-04-14AnomaliAaron Shelmire
Targeted Ransomware Activity
Mikoponi
2016-04-07ThreatpostTom Spring
FBI Quietly Admits to Multi-Year APT Attack, Sensitive Data Stolen
APT6
2016-04-06CybereasonAmit Serper
OSX Pirrit: What adware that 'just' displays ads means for Mac OS X security
Pirrit
2016-03-29SymantecJon DiMaggio
Taiwan targeted with new cyberespionage back doorTrojan
Budminer
2016-03-29SymantecJon DiMaggio
Taiwan targeted with new cyberespionage back door Trojan
Dripion Budminer
2016-03-25Palo Alto Networks Unit 42Robert Falcone, Simon Conant
ProjectM: Link Found Between Pakistani Actor and Operation Transparent Tribe
Bozok Operation C-Major
2016-03-18MalwarebytesMalwarebytes Labs
Teslacrypt Spam Campaign: “Unpaid Issue…”
TeslaCrypt
2016-03-14Palo Alto Networks Unit 42Bryan Lee, Josh Grunzweig, Robert Falcone
Digital Quartermaster Scenario Demonstrated in Attacks Against the Mongolian Government
BBSRAT CMSTAR
2016-03-11Palo Alto Networks Unit 42Brandon Levene, Josh Grunzweig
PowerSniff Malware Used in Macro-based Attacks
2016-03-09SOFTPEDIA® NEWSCatalin Cimpanu
Korean Energy and Transportation Targets Attacked by OnionDog APT
OnionDog
2016-03-07Github (xl7dev)xl7dev
RedHat Hacker.asp
RedHat Hacker WebShell