Click here to download all references as Bib-File.•
2017-04-03
⋅
Google
⋅
An investigation of Chrysaor Malware on Android Chrysaor |
2017-04-01
⋅
PricewaterhouseCoopers
⋅
Operation Cloud Hopper: Technical Annex ChChes PlugX Quasar RAT RedLeaves Trochilus RAT |
2017-03-31
⋅
Cisco Talos
⋅
Threat Round-up for Mar 24 - Mar 31 win.wabot |
2017-03-30
⋅
ClearSky
⋅
Jerusalem Post and other Israeli websites compromised by Iranian threat agent CopyKitten CopyKittens |
2017-03-30
⋅
EquationDrug rootkit analysis (mstcp32.sys) EquationDrug |
2017-03-30
⋅
Palo Alto Networks Unit 42
⋅
Trochilus and New MoonWind RATs Used In Attack Against Thai Organizations MoonWind |
2017-03-30
⋅
Palo Alto Networks Unit 42
⋅
Trochilus and New MoonWind RATs Used In Attack Against Thai Organizations APT9 |
2017-03-29
⋅
Imperva
⋅
New Mirai Variant Launches 54 Hour DDoS Attack against US College Mirai |
2017-03-28
⋅
Cylance
⋅
Threat Spotlight: GhostAdmin Malware GhostAdmin |
2017-03-27
⋅
Microsoft
⋅
Detecting and mitigating elevation-of-privilege exploit for CVE-2017-0005 APT31 |
2017-03-23
⋅
FireEye
⋅
WMImplant – A WMI Based Agentless Post-Exploitation RAT Developed in PowerShell WMImplant |
2017-03-22
⋅
Trend Micro
⋅
Winnti Abuses GitHub for C&C Communications EASYNIGHT APT41 |
2017-03-22
⋅
Cylance
⋅
El Machete's Malware Attacks Cut Through LATAM Machete El Machete |
2017-03-22
⋅
Cylance
⋅
El Machete's Malware Attacks Cut Through LATAM El Machete |
2017-03-22
⋅
Trend Micro
⋅
Winnti Abuses GitHub for C&C Communications Winnti |
2017-03-21
⋅
DomainTools
⋅
Hunt Case Study: Hunting Campaign Indicators on Privacy Protected Attack Infrastructure CopyKittens |
2017-03-17
⋅
Fortinet
⋅
Grabbot is Back to Nab Your Data GrabBot |
2017-03-16
⋅
Threatpost
⋅
Fileless Malware Campaigns Tied to Same Attacker FIN7 |
2017-03-15
⋅
Trend Micro
⋅
MajikPOS Combines PoS Malware and RATs to Pull Off its Malicious Tricks MajikPos |
2017-03-15
⋅
Github (MinervaLabsResearch)
⋅
Vaccinating against Spora ransomware: a proof-of-concept tool by Minerva Spora |