Click here to download all references as Bib-File.•
2015-12-04
⋅
Kaspersky Labs
⋅
Sofacy APT hits high profile targets with updated toolset Coreshell Sedreco Seduploader X-Agent APT28 |
2015-12-04
⋅
Kaspersky Labs
⋅
Sofacy APT hits high profile targets with updated toolset Sedreco |
2015-12-03
⋅
360 Internet Security Center
⋅
Automatically Classifying Unknown Bots by The REGISTER Messages MrBlack XOR DDoS DarkShell |
2015-12-03
⋅
Symantec
⋅
Colombians major target of email campaigns delivering Xtreme RAT Xtreme RAT |
2015-12-01
⋅
Trend Micro
⋅
Operation Black Atlas Endangers In-Store Card Payments and SMBs Worldwide; Switches between BlackPOS and Other Tools Alina POS BlackPOS Kronos NewPosThings |
2015-12-01
⋅
FireEye
⋅
China-based Cyber Threat Group Uses Dropbox for Malware Communications and Targets Hong Kong Media Outlets BUBBLEWRAP LOWBALL TEMPER PANDA |
2015-11-30
⋅
0x3A Security
⋅
Inside Braviax/FakeRean: An analysis and history of a FakeAV family |
2015-11-25
⋅
RSA
⋅
Detecting GlassRAT using Security Analytics and ECAT GlassRAT |
2015-11-24
⋅
FireEye
⋅
ModPOS: Highly-Sophisticated, Stealthy Malware Targeting US POS Systems with High Likelihood of Broader Campaigns ModPOS |
2015-11-23
⋅
MinervaLabs
⋅
CopyKittens Attack Group CopyKittens |
2015-11-19
⋅
JPCERT/CC
⋅
Decrypting Strings in Emdivi Emdivi |
2015-11-11
⋅
ESET Research
⋅
Operation Buhtrap malware distributed via ammyy.com BuhTrap |
2015-11-11
⋅
Proofpoint
⋅
AbaddonPOS: A new point of sale threat linked to Vawtrak AbaddonPOS TinyLoader |
2015-11-06
⋅
SecurityIntelligence
⋅
OmniRAT Takes Over Android Devices Through Social Engineering Tricks OmniRAT |
2015-11-04
⋅
Check Point
⋅
“Offline” Ransomware Encrypts Your Data without C&C Communication Cryakl |
2015-11-04
⋅
Malwarebytes
⋅
A Technical Look At Dyreza Dyre |
2015-11-04
⋅
Avast
⋅
DroidJack isn’t the only spying software out there: Avast discovers OmniRat OmniRAT |
2015-10-28
⋅
Reversing the C2C HTTP Emmental communication Retefe |
2015-10-22
⋅
Trend Micro
⋅
Pawn Storm Targets MH17 Investigation Team APT28 |
2015-10-16
⋅
Palo Alto Networks Unit 42
⋅
Surveillance Malware Trends: Tracking Predator Pain and HawkEye HawkEye Keylogger |