Click here to download all references as Bib-File.•
2016-11-22
⋅
Help Net Security
⋅
Cobalt hackers executed massive, synchronized ATM heists across Europe, Russia Cobalt |
2016-11-14
⋅
Dr.Web
⋅
Doctor Web discovers a botnet that attacks Russian banks |
2016-11-14
⋅
Proofpoint
⋅
Ransoc Desktop Locking Ransomware Ransacks Local Files and Social Media Profiles Ransoc |
2016-11-09
⋅
Tricks of the Trade: A Deeper Look Into TrickBot’s Machinations TrickBot |
2016-11-08
⋅
Verint
⋅
SPAMTORTE VERSION 2: DISCOVERY OF AN ADVANCED, MULTILAYERED SPAMBOT CAMPAIGN THAT IS BACK WITH A VENGEANCE Spamtorte |
2016-10-27
⋅
Trend Micro
⋅
BLACKGEAR Espionage Campaign Evolves, Adds Japan To Target List Blackgear |
2016-10-26
⋅
Unknown
⋅
Moonlight – Targeted attacks in the Middle East Houdini NjRAT Molerats |
2016-10-24
⋅
Lastline
⋅
Evasive Malware Detects and Defeats Virtual Machine Analysis |
2016-10-21
⋅
Forcepoint
⋅
BITTER: a targeted attack against Pakistan Bitter RAT |
2016-10-17
⋅
Palo Alto Networks Unit 42
⋅
‘DealersChoice’ is Sofacy’s Flash Player Exploit Platform APT28 |
2016-10-11
⋅
Symantec
⋅
Odinaff: New Trojan used in high level financial attacks Batel FlawedAmmyy Odinaff RMS FIN7 |
2016-10-11
⋅
Symantec
⋅
Odinaff: New Trojan used in high level financial attacks Cobalt Strike KLRD MimiKatz Odinaff |
2016-10-10
⋅
BBC
⋅
How France's TV5 was almost destroyed by 'Russian hackers' APT28 |
2016-10-07
⋅
FireEye
⋅
Attacking the Hospitality and Gaming Industries: Tracking an Attacker Around the World in 7 Years RawPOS |
2016-10-06
⋅
Virus Bulletin
⋅
On the StrongPity Waterhole Attacks Targeting Italian and Belgian Encryption Users PROMETHIUM |
2016-10-03
⋅
Kaspersky Labs
⋅
On the StrongPity Waterhole Attacks Targeting Italian and Belgian Encryption Users StrongPity |
2016-10-01
⋅
Vice Motherboard
⋅
‘Shadow Brokers’ Whine That Nobody Is Buying Their Hacked NSA Files The Shadow Brokers |
2016-09-30
⋅
Bleeping Computer
⋅
Hacked Steam accounts spreading Remote Access Trojan NetSupportManager RAT |
2016-09-28
⋅
Forcepoint
⋅
Highly Evasive Code Injection Awaits User Interaction Before Delivering Malware BuhTrap |
2016-09-27
⋅
Malwarebytes
⋅
Komplex Mac backdoor answers old questions Komplex |