Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-08-01ZscalerDeepen Desai
Agent Tesla Keylogger delivered using cybersquatting
Agent Tesla
2016-07-31Security AffairsPierluigi Paganini
China 1937CN Team Hackers Attack Airports in Vietnam
1937CN
2016-07-30MalwareNailedFaisal AM Qureshi
Luminosity RAT - Re-purposed
Luminosity RAT
2016-07-26Palo Alto Networks Unit 42Jen Miller-Osborn, Robert Falcone
Attack Delivers ‘9002’ Trojan Through Google Drive
2016-07-26ProofpointProofpoint
Threat Actors Using Legitimate PayPal Accounts To Distribute Chthonic Banking Trojan
Azorult Chthonic
2016-07-25SymantecSymantec
Patchwork cyberespionage group expands targets from governments to wide range of industries
QUILTED TIGER
2016-07-25SymantecJoji Hamada
Patchwork cyberespionage group expands targets from governments to wide range of industries
2016-07-21McAfeeMohinder Gill, Oliver Devane
Phishing Attacks Employ Old but Effective Password Stealer
ISR Stealer
2016-07-21KrebsOnSecurityBrian Krebs
Canadian Man Behind Popular ‘Orcus RAT’
Orcus RAT
2016-07-20Trend MicroKawabata Kohei
CrypMIC Ransomware Wants to Follow CryptXXX’s Footsteps
CrypMic
2016-07-13MicrosoftMicrosoft Defender ATP Research Team
Troldesh ransomware influenced by (the) Da Vinci code
Troldesh
2016-07-12Fidelis CybersecurityThreat Research Team
Me and Mr. Robot: Tracking the Actor Behind the MAN1 Crypter
Hancitor Vawtrak
2016-07-08Kaspersky LabsGReAT
The Dropping Elephant – aggressive cyber-espionage in the Asian region
QUILTED TIGER
2016-07-08Palo Alto Networks Unit 42Josh Grunzweig
Investigating the LuminosityLink Remote Access Trojan Configuration
Luminosity RAT
2016-07-07Pierluigi Paganini
New threat dubbed Zepto Ransomware is spreading out with a new email spam campaign. It is a variant of the recent Locky Ransomware.
Locky
2016-06-25NSHCNSHC Threatrecon Team
SectorC08: Multi-Layered SFX in Recent Campaigns Target Ukraine
Pteranodon
2016-06-23Palo Alto Networks Unit 42Kaoru Hayashi
Tracking Elirks Variants in Japan: Similarities to Previous Attacks
Elirks
2016-06-17Check PointOren Koriat
In The Wild: Mobile Malware Implements New Features
Triada
2016-06-17Kaspersky LabsAnton Ivanov, Costin Raiu
Operation Daybreak
StarCruft APT37
2016-06-17ThreatpostMichael Mimoso
ScarCruft APT Group Used Latest Flash Zero Day in Two Dozen Attacks
APT37