Click here to download all references as Bib-File.•
2017-03-14
⋅
ClearSky
⋅
Operation Electric Powder – Who is targeting Israel Electric Company? Molerat Loader |
2017-03-14
⋅
Arnaud Delmas
⋅
Analyzing and Deobfuscating FlokiBot Banking Trojan FlokiBot |
2017-03-14
⋅
Kaspersky Labs
⋅
PetrWrap: the new Petya-based ransomware used in targeted attacks PetrWrap |
2017-03-14
⋅
ClearSky
⋅
Operation Electric Powder – Who is targeting Israel Electric Company? ElectricPowder |
2017-03-13
⋅
Google
⋅
Detecting and eliminating Chamois, a fraud botnet on Android Chamois |
2017-03-08
⋅
Cylance
⋅
RawPOS Malware Rides Again RawPOS |
2017-03-07
⋅
Kaspersky Labs
⋅
FROM SHAMOON TO STONEDRILL: Wipers attacking Saudi organizations and beyond StoneDrill |
2017-03-06
⋅
0-Day: Dahua backdoor Generation 2 and 3 BrickerBot |
2017-03-02
⋅
Laboratory of Cryptography and System Security
⋅
Update on the Fancy Bear Android malware (poprd30.apk) X-Agent |
2017-03-01
⋅
FraudWatch International
⋅
How Does the Trickbot Malware Work? TrickBot |
2017-03-01
⋅
Cylance
⋅
Threat Spotlight: Flokibot PoS Malware FlokiBot |
2017-02-28
⋅
Security Intelligence
⋅
Dridex’s Cold War: Enter AtomBombing Dridex |
2017-02-27
⋅
Symantec
⋅
Shamoon: Multi-staged destructive attacks limited to specific targets DistTrack MimiKatz Rocket Kitten |
2017-02-27
⋅
Sophos
⋅
Betabot: Configuration Data Extraction BetaBot |
2017-02-27
⋅
Cylance
⋅
The Deception Project: A New Japanese-Centric Threat Snake Wine |
2017-02-27
⋅
Threat Vector
⋅
The Deception Project: A New Japanese-Centric Threat ChChes Snake Wine |
2017-02-27
⋅
Symantec
⋅
Shamoon: Multi-staged destructive attacks limited to specific targets Rocket Kitten |
2017-02-25
⋅
Financial Security Institute
⋅
Silent RIFLE: Response Against Advanced Threat Ghost RAT |
2017-02-24
⋅
BitSight
⋅
Necurs Proxy Module With DDOS Features Necurs |
2017-02-22
⋅
Github (kai5263499)
⋅
Bella: A pure python, post-exploitation, data mining tool and remote administration tool for macOS. Bella |