Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-04-22Palo Alto Networks Unit 42Brandon Levene, Jen Miller-Osborn, Micah Yates, Mike Scott
New Poison Ivy RAT Variant Targets Hong Kong Pro-Democracy Activists
Poison Ivy
2016-04-21ThreatpostTom Spring
PoS Attacks Net Crooks 20 Million Stolen Bank Cards
Vawtrak
2016-04-19EndgameMark Mager
Your Package Has Been Successfully Encrypted: TeslaCrypt 4.1A and the Malware Attack Chain
TeslaCrypt
2016-04-19FireEyeCian Lynch, Claudiu Teodorescu, Dimiter Andonov
MULTIGRAIN – Point of Sale Attackers Make an Unhealthy Addition to the Pantry
Multigrain POS
2016-04-14AnomaliAaron Shelmire
Targeted Ransomware Activity
Mikoponi
2016-04-07ThreatpostTom Spring
FBI Quietly Admits to Multi-Year APT Attack, Sensitive Data Stolen
APT6
2016-04-06CybereasonAmit Serper
OSX Pirrit: What adware that 'just' displays ads means for Mac OS X security
Pirrit
2016-03-29SymantecJon DiMaggio
Taiwan targeted with new cyberespionage back doorTrojan
Budminer
2016-03-29SymantecJon DiMaggio
Taiwan targeted with new cyberespionage back door Trojan
Dripion Budminer
2016-03-25Palo Alto Networks Unit 42Robert Falcone, Simon Conant
ProjectM: Link Found Between Pakistani Actor and Operation Transparent Tribe
Bozok Operation C-Major
2016-03-18MalwarebytesMalwarebytes Labs
Teslacrypt Spam Campaign: “Unpaid Issue…”
TeslaCrypt
2016-03-14Palo Alto Networks Unit 42Bryan Lee, Josh Grunzweig, Robert Falcone
Digital Quartermaster Scenario Demonstrated in Attacks Against the Mongolian Government
BBSRAT CMSTAR
2016-03-11Palo Alto Networks Unit 42Brandon Levene, Josh Grunzweig
PowerSniff Malware Used in Macro-based Attacks
2016-03-09SOFTPEDIA® NEWSCatalin Cimpanu
Korean Energy and Transportation Targets Attacked by OnionDog APT
OnionDog
2016-03-07Github (xl7dev)xl7dev
RedHat Hacker.asp
RedHat Hacker WebShell
2016-03-04SANSDavid Martin
Tracing the Lineage of DarkSeoul
httpdropper
2016-03-03Kaspersky LabsMikhail Kuzin, Nikita Buchka
Attack on Zygote: a new twist in the evolution of mobile threats
Triada
2016-03-01Group-IBGroup-IB
BUHTRAP: The Evolution of Targetted Attacks Against Financial Instituitions
BuhTrap
2016-03-01Trend MicroDavid Sancho, Feike Hacquebord
Operation C-Major: Information Theft Campaign Targets Military Personnel in India
Operation C-Major
2016-02-29SophosPaul Ducklin
The “HawkEye” attack: how cybercrooks target small businesses for big money
HawkEye Keylogger