Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-03-14ClearSkyClearSky Research Team
Operation Electric Powder – Who is targeting Israel Electric Company?
Molerat Loader
2017-03-14Arnaud DelmasArnaud Delmas
Analyzing and Deobfuscating FlokiBot Banking Trojan
FlokiBot
2017-03-14Kaspersky LabsAnton Ivanov, Fedor Sinitsyn
PetrWrap: the new Petya-based ransomware used in targeted attacks
PetrWrap
2017-03-14ClearSkyClearSky Research Team
Operation Electric Powder – Who is targeting Israel Electric Company?
ElectricPowder
2017-03-13GoogleBernhard Grill, Megan Ruthven, Xin Zhao
Detecting and eliminating Chamois, a fraud botnet on Android
Chamois
2017-03-08CylanceThreat Research Team
RawPOS Malware Rides Again
RawPOS
2017-03-07Kaspersky LabsGReAT
FROM SHAMOON TO STONEDRILL: Wipers attacking Saudi organizations and beyond
StoneDrill
2017-03-06bashis
0-Day: Dahua backdoor Generation 2 and 3
BrickerBot
2017-03-02Laboratory of Cryptography and System SecurityBoldizsar Bencsath
Update on the Fancy Bear Android malware (poprd30.apk)
X-Agent
2017-03-01FraudWatch InternationalFraudWatch International
How Does the Trickbot Malware Work?
TrickBot
2017-03-01CylanceCylance Threat Research Team
Threat Spotlight: Flokibot PoS Malware
FlokiBot
2017-02-28Security IntelligenceMagal Baz, Or Safran
Dridex’s Cold War: Enter AtomBombing
Dridex
2017-02-27SymantecA L Johnson
Shamoon: Multi-staged destructive attacks limited to specific targets
DistTrack MimiKatz Rocket Kitten
2017-02-27SophosTed Heppner
Betabot: Configuration Data Extraction
BetaBot
2017-02-27CylanceJon Gross
The Deception Project: A New Japanese-Centric Threat
Snake Wine
2017-02-27Threat VectorJon Gross
The Deception Project: A New Japanese-Centric Threat
ChChes Snake Wine
2017-02-27SymantecSymantec Security Response
Shamoon: Multi-staged destructive attacks limited to specific targets
Rocket Kitten
2017-02-25Financial Security InstituteKyoung-Ju Kwak (郭炅周)
Silent RIFLE: Response Against Advanced Threat
Ghost RAT
2017-02-24BitSightSofia Luis
Necurs Proxy Module With DDOS Features
Necurs
2017-02-22Github (kai5263499)kai5263499
Bella: A pure python, post-exploitation, data mining tool and remote administration tool for macOS.
Bella