Click here to download all references as Bib-File.•
2016-04-21
⋅
Threatpost
⋅
PoS Attacks Net Crooks 20 Million Stolen Bank Cards Vawtrak |
2016-04-19
⋅
Endgame
⋅
Your Package Has Been Successfully Encrypted: TeslaCrypt 4.1A and the Malware Attack Chain TeslaCrypt |
2016-04-19
⋅
FireEye
⋅
MULTIGRAIN – Point of Sale Attackers Make an Unhealthy Addition to the Pantry Multigrain POS |
2016-04-15
⋅
FireEye
⋅
2016 THREAT BRIEFING: “GOOD ENOUGH” IS NOT GOOD ENOUGH Poldat |
2016-04-11
⋅
G Data
⋅
Manamecrypt – a ransomware that takes a different route ManameCrypt |
2016-04-07
⋅
Threatpost
⋅
FBI Quietly Admits to Multi-Year APT Attack, Sensitive Data Stolen APT6 |
2016-04-06
⋅
Cylance
⋅
Operation Cleaver Cleaver |
2016-04-06
⋅
Avast
⋅
Andromeda under the microscope Andromeda |
2016-04-06
⋅
Cylance
⋅
Operation Cleaver CsExt Jasus KAgent NetC PvzOut SynFlooder TinyZbot WndTest ZhCat ZhMimikatz Cleaver |
2016-04-06
⋅
Proofpoint
⋅
Locky Ransomware Is Becoming More Sophisticated - Cybercriminals Continue Email Campaign Innovation Rockloader |
2016-04-06
⋅
Cybereason
⋅
OSX Pirrit: What adware that 'just' displays ads means for Mac OS X security Pirrit |
2016-04-04
⋅
Akamai
⋅
Threat Advisory: “BillGates” Botnet BillGates |
2016-04-01
⋅
FireEye
⋅
Follow the Money: Dissecting the Operations of the Cyber Crime Group FIN6 Grateful POS FIN6 |
2016-03-30
⋅
Secureworks
⋅
Ransomware Deployed by Adversary with Established Foothold MimiKatz reGeorg SamSam BOSS SPIDER |
2016-03-29
⋅
ThreatVector
⋅
Ransomware Update: Today’s Bountiful Cornucopia of Extortive Threats PowerWare |
2016-03-25
⋅
Palo Alto Networks Unit 42
⋅
ProjectM: Link Found Between Pakistani Actor and Operation Transparent Tribe Bozok Operation C-Major |
2016-03-21
⋅
AT&T Cybersecurity
⋅
OS X Malware Samples Analyzed Careto CoinThief FlashBack |
2016-03-15
⋅
Symantec
⋅
Suckfly: Revealing the secret life of your code signing certificates APT22 |
2016-03-15
⋅
Symantec
⋅
Suckfly: Revealing the secret life of your code signing certificates |
2016-03-14
⋅
Palo Alto Networks Unit 42
⋅
Digital Quartermaster Scenario Demonstrated in Attacks Against the Mongolian Government BBSRAT CMSTAR |