Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-06-27MicrosoftMicrosoft Defender ATP Research Team
New ransomware, old techniques: Petya adds worm capabilities
Petya
2017-06-27ESET ResearchEset
New WannaCryptor‑like ransomware attack hits globally: All you need to know
2017-06-27Kaspersky LabsGReAT
Schroedinger’s Pet(ya)
EternalPetya
2017-06-27Kaspersky LabsSergey Yunakovsky
Neutrino modification for POS-terminals
Neutrino POS
2017-06-26Medium verovalerosVeronica Valeros
El Machete — What do we know about the APT targeting Latin America?
Machete
2017-06-22Bleeping ComputerCatalin Cimpanu
Locky Ransomware Returns, but Targets Only Windows XP & Vista
Locky
2017-06-22G DataLuca Ebach
Analysis Results of Zeus.Variant.Panda
PandaBanker
2017-06-22SANS Institute Information Security Reading RoomRob Pantazopoulos
Loki-Bot: InformationStealer, Keylogger, &More!
Loki Password Stealer (PWS)
2017-06-21CiscoAlex Chiu, Jaeson Schultz, Matthew Molyett, Sean Baird, Warren Mercer
Player 1 Limps Back Into the Ring - Hello again, Locky!
Locky
2017-06-19root9broot9b
SHELLTEA + POSLURP Malware Memory-resident Point-of-Sale Malware Attacks Industry
PoSlurp FIN8
2017-06-19root9broot9b
SHELLTEA + POSLURP Malware Memory-resident Point-of-Sale Malware Attacks Industry
FIN8
2017-06-16FireEyeFireEye
FIN10: Anatomy of a Cyber Extortion Operation
FIN10
2017-06-15Limor Kessem
Zeus Sphinx Pushes Empty Configuration Files — What Has the Sphinx Got Cooking?
Zloader
2017-06-14ThreatConnectThreatConnect Research Team
Phantom of the Opaera: New KASPERAGENT Malware Campaign
KasperAgent AridViper
2017-06-13DragosDragos
CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations
ENERGETIC BEAR
2017-06-13DragosDragos
CRASHOVERRIDE: Analysis of the Threatto Electric Grid Operations
Industroyer Sandworm
2017-06-13CylanceCylance Threat Research Team
Threat Spotlight: Breaking Down FF-Rat Malware
FormerFirstRAT
2017-06-12ESET ResearchAnton Cherepanov
WIN32/INDUSTROYER: A new threat for industrial control systems
Industroyer Sandworm
2017-06-12BellingcatCollin Anderson
Bahamut, Pursuing a Cyber Espionage Actor in the Middle East
Bahamut Bahamut Bahamut
2017-06-12ESET ResearchAnton Cherepanov, Robert Lipovsky
Industroyer: Biggest threat to industrial control systems since Stuxnet
Industroyer