Click here to download all references as Bib-File.•
2015-09-14
⋅
Kaspersky Labs
⋅
The Shade Encryptor: a Double Threat CMSBrute Troldesh |
2015-09-11
⋅
FireEye
⋅
SUCEFUL: Next Generation ATM Malware SUCEFUL |
2015-09-10
⋅
FireEye
⋅
Hangul Word Processor (HWP)Zero-Day: possible ties to North Korean threat actors HOPLIGHT |
2015-09-09
⋅
Kaspersky Labs
⋅
Satellite Turla: APT Command and Control in the Sky Turla |
2015-09-09
⋅
Kaspersky Labs
⋅
Satellite Turla: APT Command and Control in the Sky Satellite Turla Turla |
2015-09-08
⋅
FireEye
⋅
Two for One: Microsoft Office Encapsulated PostScriptand Windows Privilege Escalation Zero-Days REDSALT |
2015-09-01
⋅
Virus Bulletin
⋅
DDOS TROJAN: A MALICIOUS CONCEPT THAT CONQUERED THE ELF FORMAT Bashlite MrBlack XOR DDoS BillGates |
2015-09-01
⋅
Trend Micro
⋅
Attackers Target Organizations in Japan; Transform Local Sites into C&C Servers for EMDIVI Backdoor Emdivi |
2015-08-31
⋅
SecurityIntelligence
⋅
Shifu: ‘Masterful’ New Banking Trojan Is Attacking 14 Japanese Banks Shifu |
2015-08-27
⋅
CitizenLab
⋅
London Calling: Two-Factor Authentication Phishing From Iran Rocket Kitten |
2015-08-27
⋅
Electronic Frontier Foundation
⋅
New Spear Phishing Campaign Pretends to be EFF APT28 |
2015-08-24
⋅
DarkMatters
⋅
Sphinx: New Zeus Variant for Sale on the Black Market Zeus Sphinx |
2015-08-19
⋅
Github (samratashok)
⋅
Antak WebShell ANTAK |
2015-08-18
⋅
Github (goliate)
⋅
ransomware open-sources HiddenTear |
2015-08-18
⋅
ByteAtlas
⋅
Knowledge Fragment: Unwrapping Fobber Fobber |
2015-08-17
⋅
F-Secure Labs
⋅
THE DUKES 7 YEARS OF RUSSIAN CYBERESPIONAGE COZYDUKE GeminiDuke |
2015-08-12
⋅
Wikipedia
⋅
Islamic State Hacking Division Cyber Caliphate Army |
2015-08-10
⋅
Palo Alto Networks Unit 42
⋅
What’s Next in Malware After Kuluoz? Asprox |
2015-08-10
⋅
Kaspersky Labs
⋅
Darkhotel’s attacks in 2015 DarkHotel DarkHotel |
2015-08-05
⋅
Secureworks
⋅
Threat Group 3390 Cyberespionage APT27 |