Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2014-10-14SymantecSymantec Security Response
Security vendors take action against Hidden Lynx malware
Gameover P2P HiKit Shylock APT17
2014-10-14SymantecSymantec Security Response
Sandworm Windows zero-day vulnerability being actively exploited in targeted attacks
Sandworm
2014-10-14SymantecSymantec Security Response
Sandworm Windows zero-day vulnerability being actively exploited in targeted attacks
Sandworm
2014-10-14SymantecSymantec Security Response
Security vendors take action against Hidden Lynx malware
HiKit
2014-10-14ESET ResearchRobert Lipovsky
CVE‑2014‑4114: Details on August BlackEnergy PowerPoint Campaigns
BlackEnergy
2014-10-01Trend MicroAlfred Remorin, Douglas Otis, Feike Hacquebord, Fernando Mercês, Jim Gogolinski, Loucif Kharouni, Numaan Huq
Operation Pawn Storm: Using Decoys to Evade Detection
2014-09-22SecurityIntelligenceAssaf Regev, Tal Darsan
Tinba Malware Reloaded and Attacking Banks Around the World
Tinba
2014-09-21garage4hackersgarage4hackers
Reversing Tinba: World's smallest trojan-banker DGA Code
2014-09-19Palo Alto Networks Unit 42Jen Miller-Osborn, Ryan Olson
Recent Watering Hole Attacks Attributed to APT Group “th3bug” Using Poison Ivy
APT20
2014-09-19Palo Alto Networks Unit 42Jen Miller-Osborn, Ryan Olson
Recent Watering Hole Attacks Attributed to APT Group “th3bug” Using Poison Ivy
Poison Ivy
2014-09-11BleepingComputer ForumsDecrypterFixer
TorrentLocker Ransomware Cracked and Decrypter has been made
TorrentLocker
2014-09-04FireEyeJames T. Bennett, Mike Scott
Forced to Adapt: XSLCmd Backdoor Now on OS X
XSLCmd APT15
2014-08-29Kaspersky LabsCostin Raiu, Roel Schouwenberg, Ryan Naraine
Sinkholing the Backoff POS Trojan
Backoff POS
2014-08-29Trend MicroRhena Inocencio
New BlackPOS Malware Emerges in the Wild, Targets Retail Accounts
BlackPOS
2014-08-29FireEyeKyle Wilhoit, Thoufique Haq
Connecting the Dots: Syrian Malware Team Uses BlackWorm for Attacks
Blackworm RAT
2014-08-28Trend MicroChristopher Daniel So
BIFROSE Now More Evasive Through Tor, Used for Targeted Attack
bifrose
2014-08-28AT&TJaime Blasco
Scanbox: A Reconnaissance Framework Used with Watering Hole Attacks
scanbox
2014-08-20Kaspersky LabsGReAT
“El Machete”
Machete El Machete
2014-08-19Michael Mimoso
APT Gang Branches Out to Medical Espionage in Community Health Breach
APT18
2014-08-08FireEyeFireEye
Sidewinder Targeted Attack Against Android in the Golden Age of AD Libraries
RAZOR TIGER