Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-10-11SymantecSymantec Security Response
Odinaff: New Trojan used in high level financial attacks
Batel FlawedAmmyy Odinaff RMS FIN7
2016-10-11SymantecSymantec Security Response
Odinaff: New Trojan used in high level financial attacks
Cobalt Strike KLRD MimiKatz Odinaff
2016-10-09SITE Intelligence Group
SiteIntel: Cyber Caliphate Army
Cyber Caliphate Army
2016-10-07FireEyeMatt Bromiley, Preston Lewis
Attacking the Hospitality and Gaming Industries: Tracking an Attacker Around the World in 7 Years
RawPOS
2016-10-06Virus BulletinKurt Baumgartner
On the StrongPity Waterhole Attacks Targeting Italian and Belgian Encryption Users
PROMETHIUM
2016-10-05ThaiCERT
The Shadow Brokers auctions cyber weapons from Equation Group
Equation Group
2016-10-05Trend MicroTrend Micro Cyber Safety Solutions Team
FastPOS Updates in Time for the Retail Sale Season
FastPOS
2016-10-04Trend MicroTrend Micro
FastPOS Updates in Time for the Retail Sale Season (Appendix)
FastPOS
2016-10-04Palo Alto Networks Unit 42Josh Grunzweig, Robert Falcone
OilRig Malware Campaign Updates Toolset and Expands Targets
Helminth
2016-10-04Palo Alto Networks Unit 42Josh Grunzweig, Robert Falcone
OilRig Malware Campaign Updates Toolset and Expands Targets
OilRig
2016-10-03Kaspersky LabsKurt Baumgartner
On the StrongPity Waterhole Attacks Targeting Italian and Belgian Encryption Users
StrongPity
2016-10-01CrowdStrikeCrowdStrike
2015 Global Threat Report
MIMIC SPIDER
2016-10-01Vice MotherboardJanus Rose
‘Shadow Brokers’ Whine That Nobody Is Buying Their Hacked NSA Files
The Shadow Brokers
2016-09-29Kaspersky LabsAnton Ivanov, Fedor Sinitsyn, GReAT
TeamXRat: Brazilian cybercrime meets ransomware
Xpan TeamXRat
2016-09-28ThreatConnectThreatConnect Research Team
Belling the BEAR
Cyber Berkut
2016-09-28Palo Alto Networks Unit 42Micah Yates, Tom Lancaster
Confucius Says…Malware Families Get Further By Abusing Legitimate Websites
Confucius SNEEPY
2016-09-27Talos IntelligenceEdmund Brumaghin
Threat Spotlight: GozNym
Nymaim
2016-09-23FireEyeAnkit Anubhav, Dileep Kumar Jallepalli
Hancitor (AKA Chanitor) observed using multiple attack approaches
Hancitor
2016-09-23Laanwj's Blog@orionwl
SECONDDATE in action
Equationgroup (Sorting)
2016-09-22ESET ResearchAnton Cherepanov
Book of Eli: African targeted attacks
Book of Eli