Click here to download all references as Bib-File.•
2016-10-11
⋅
Symantec
⋅
Odinaff: New Trojan used in high level financial attacks Batel FlawedAmmyy Odinaff RMS FIN7 |
2016-10-11
⋅
Symantec
⋅
Odinaff: New Trojan used in high level financial attacks Cobalt Strike KLRD MimiKatz Odinaff |
2016-10-09
⋅
SiteIntel: Cyber Caliphate Army Cyber Caliphate Army |
2016-10-07
⋅
FireEye
⋅
Attacking the Hospitality and Gaming Industries: Tracking an Attacker Around the World in 7 Years RawPOS |
2016-10-06
⋅
Virus Bulletin
⋅
On the StrongPity Waterhole Attacks Targeting Italian and Belgian Encryption Users PROMETHIUM |
2016-10-05
⋅
The Shadow Brokers auctions cyber weapons from Equation Group Equation Group |
2016-10-05
⋅
Trend Micro
⋅
FastPOS Updates in Time for the Retail Sale Season FastPOS |
2016-10-04
⋅
Trend Micro
⋅
FastPOS Updates in Time for the Retail Sale Season (Appendix) FastPOS |
2016-10-04
⋅
Palo Alto Networks Unit 42
⋅
OilRig Malware Campaign Updates Toolset and Expands Targets Helminth |
2016-10-04
⋅
Palo Alto Networks Unit 42
⋅
OilRig Malware Campaign Updates Toolset and Expands Targets OilRig |
2016-10-03
⋅
Kaspersky Labs
⋅
On the StrongPity Waterhole Attacks Targeting Italian and Belgian Encryption Users StrongPity |
2016-10-01
⋅
CrowdStrike
⋅
2015 Global Threat Report MIMIC SPIDER |
2016-10-01
⋅
Vice Motherboard
⋅
‘Shadow Brokers’ Whine That Nobody Is Buying Their Hacked NSA Files The Shadow Brokers |
2016-09-29
⋅
Kaspersky Labs
⋅
TeamXRat: Brazilian cybercrime meets ransomware Xpan TeamXRat |
2016-09-28
⋅
ThreatConnect
⋅
Belling the BEAR Cyber Berkut |
2016-09-28
⋅
Palo Alto Networks Unit 42
⋅
Confucius Says…Malware Families Get Further By Abusing Legitimate Websites Confucius SNEEPY |
2016-09-27
⋅
Talos Intelligence
⋅
Threat Spotlight: GozNym Nymaim |
2016-09-23
⋅
FireEye
⋅
Hancitor (AKA Chanitor) observed using multiple attack approaches Hancitor |
2016-09-23
⋅
Laanwj's Blog
⋅
SECONDDATE in action Equationgroup (Sorting) |
2016-09-22
⋅
ESET Research
⋅
Book of Eli: African targeted attacks Book of Eli |