Click here to download all references as Bib-File.•
2016-04-22
⋅
Palo Alto Networks Unit 42
⋅
New Poison Ivy RAT Variant Targets Hong Kong Pro-Democracy Activists Poison Ivy |
2016-04-21
⋅
Threatpost
⋅
PoS Attacks Net Crooks 20 Million Stolen Bank Cards Vawtrak |
2016-04-19
⋅
Endgame
⋅
Your Package Has Been Successfully Encrypted: TeslaCrypt 4.1A and the Malware Attack Chain TeslaCrypt |
2016-04-19
⋅
FireEye
⋅
MULTIGRAIN – Point of Sale Attackers Make an Unhealthy Addition to the Pantry Multigrain POS |
2016-04-14
⋅
Anomali
⋅
Targeted Ransomware Activity Mikoponi |
2016-04-07
⋅
Threatpost
⋅
FBI Quietly Admits to Multi-Year APT Attack, Sensitive Data Stolen APT6 |
2016-04-06
⋅
Cybereason
⋅
OSX Pirrit: What adware that 'just' displays ads means for Mac OS X security Pirrit |
2016-03-29
⋅
Symantec
⋅
Taiwan targeted with new cyberespionage back doorTrojan Budminer |
2016-03-29
⋅
Symantec
⋅
Taiwan targeted with new cyberespionage back door Trojan Dripion Budminer |
2016-03-25
⋅
Palo Alto Networks Unit 42
⋅
ProjectM: Link Found Between Pakistani Actor and Operation Transparent Tribe Bozok Operation C-Major |
2016-03-18
⋅
Malwarebytes
⋅
Teslacrypt Spam Campaign: “Unpaid Issue…” TeslaCrypt |
2016-03-14
⋅
Palo Alto Networks Unit 42
⋅
Digital Quartermaster Scenario Demonstrated in Attacks Against the Mongolian Government BBSRAT CMSTAR |
2016-03-11
⋅
Palo Alto Networks Unit 42
⋅
PowerSniff Malware Used in Macro-based Attacks |
2016-03-09
⋅
SOFTPEDIA® NEWS
⋅
Korean Energy and Transportation Targets Attacked by OnionDog APT OnionDog |
2016-03-07
⋅
Github (xl7dev)
⋅
RedHat Hacker.asp RedHat Hacker WebShell |
2016-03-04
⋅
SANS
⋅
Tracing the Lineage of DarkSeoul httpdropper |
2016-03-03
⋅
Kaspersky Labs
⋅
Attack on Zygote: a new twist in the evolution of mobile threats Triada |
2016-03-01
⋅
Group-IB
⋅
BUHTRAP: The Evolution of Targetted Attacks Against Financial Instituitions BuhTrap |
2016-03-01
⋅
Trend Micro
⋅
Operation C-Major: Information Theft Campaign Targets Military Personnel in India Operation C-Major |
2016-02-29
⋅
Sophos
⋅
The “HawkEye” attack: how cybercrooks target small businesses for big money HawkEye Keylogger |