Click here to download all references as Bib-File.•
2014-10-14
⋅
Symantec
⋅
Security vendors take action against Hidden Lynx malware Gameover P2P HiKit Shylock APT17 |
2014-10-14
⋅
Symantec
⋅
Sandworm Windows zero-day vulnerability being actively exploited in targeted attacks Sandworm |
2014-10-14
⋅
Symantec
⋅
Sandworm Windows zero-day vulnerability being actively exploited in targeted attacks Sandworm |
2014-10-14
⋅
Symantec
⋅
Security vendors take action against Hidden Lynx malware HiKit |
2014-10-14
⋅
ESET Research
⋅
CVE‑2014‑4114: Details on August BlackEnergy PowerPoint Campaigns BlackEnergy |
2014-10-01
⋅
Trend Micro
⋅
Operation Pawn Storm: Using Decoys to Evade Detection |
2014-09-22
⋅
SecurityIntelligence
⋅
Tinba Malware Reloaded and Attacking Banks Around the World Tinba |
2014-09-21
⋅
garage4hackers
⋅
Reversing Tinba: World's smallest trojan-banker DGA Code |
2014-09-19
⋅
Palo Alto Networks Unit 42
⋅
Recent Watering Hole Attacks Attributed to APT Group “th3bug” Using Poison Ivy APT20 |
2014-09-19
⋅
Palo Alto Networks Unit 42
⋅
Recent Watering Hole Attacks Attributed to APT Group “th3bug” Using Poison Ivy Poison Ivy |
2014-09-11
⋅
BleepingComputer Forums
⋅
TorrentLocker Ransomware Cracked and Decrypter has been made TorrentLocker |
2014-09-04
⋅
FireEye
⋅
Forced to Adapt: XSLCmd Backdoor Now on OS X XSLCmd APT15 |
2014-08-29
⋅
Kaspersky Labs
⋅
Sinkholing the Backoff POS Trojan Backoff POS |
2014-08-29
⋅
Trend Micro
⋅
New BlackPOS Malware Emerges in the Wild, Targets Retail Accounts BlackPOS |
2014-08-29
⋅
FireEye
⋅
Connecting the Dots: Syrian Malware Team Uses BlackWorm for Attacks Blackworm RAT |
2014-08-28
⋅
Trend Micro
⋅
BIFROSE Now More Evasive Through Tor, Used for Targeted Attack bifrose |
2014-08-28
⋅
AT&T
⋅
Scanbox: A Reconnaissance Framework Used with Watering Hole Attacks scanbox |
2014-08-20
⋅
Kaspersky Labs
⋅
“El Machete” Machete El Machete |
2014-08-19
⋅
APT Gang Branches Out to Medical Espionage in Community Health Breach APT18 |
2014-08-08
⋅
FireEye
⋅
Sidewinder Targeted Attack Against Android in the Golden Age of AD Libraries RAZOR TIGER |