Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-08-17Kaspersky LabsMohamad Amin Hasbini
Operation Ghoul: targeted attacks on industrial and engineering organizations
OpGhoul
2016-08-10CERT.PLKamil Frankowicz
CryptXXX \ CrypMIC – intensywnie dystrybuowany ransomware w ramach exploit-kitów
CrypMic CryptXXXX
2016-08-08Kaspersky LabsGReAT
ProjectSauron: top level cyber-espionage platform covertly extracts encrypted government comms
ProjectSauron
2016-08-08SymantecSymantec
Backdoor.Remsec indicators of compromise
Remsec
2016-08-04SecurityWeekSecurityWeek News
Iranian Actor "Group5" Targeting Syrian Opposition
Group5
2016-08-01CrowdStrikeAdam Meyers
CrowdStrike’s New Methodology for Tracking eCrime
Corebot BOSON SPIDER
2016-08-01UperesiaFelix Weyne
Analysis of a packed Pony downloader
Pony
2016-08-01ESET ResearchESET Research
En Route with Sednit - Part 1: Approaching the Target
Komplex Seduploader
2016-08-01Black HatClaudio Guarnieri, Collin Anderson
Iran and the Soft Warfor Internet Dominance
Infy Sima
2016-07-31Security AffairsPierluigi Paganini
China 1937CN Team Hackers Attack Airports in Vietnam
1937CN
2016-07-28BlackberryJim Walter
Petya and Mischa For All Part II: They’re Here…
Petya
2016-07-26Palo Alto Networks Unit 42Jen Miller-Osborn, Robert Falcone
Attack Delivers ‘9002’ Trojan Through Google Drive
2016-07-26ProofpointProofpoint
Threat Actors Using Legitimate PayPal Accounts To Distribute Chthonic Banking Trojan
Azorult Chthonic
2016-07-21McAfeeMohinder Gill, Oliver Devane
Phishing Attacks Employ Old but Effective Password Stealer
ISR Stealer
2016-07-12Fidelis CybersecurityThreat Research Team
Me and Mr. Robot: Tracking the Actor Behind the MAN1 Crypter
Hancitor Vawtrak
2016-07-08Palo Alto Networks Unit 42Josh Grunzweig
Investigating the LuminosityLink Remote Access Trojan Configuration
Luminosity RAT
2016-07-05BitdefenderAlexandra Gheorghe
New Backdoor Allows Full Access to Mac Systems, Bitdefender Warns
Eleanor
2016-07-01SpiderLabs BlogRodel Mendrez
How I Cracked a Keylogger and Ended Up in Someone's Inbox
HawkEye Keylogger
2016-06-30BitdefenderBitdefender
Pacifier APT
2016-06-30BitdefenderBitdefender
Pacifier APT
Skipper