Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-09-14Kaspersky LabsFedor Sinitsyn, Victor Alyushin
The Shade Encryptor: a Double Threat
CMSBrute Troldesh
2015-09-11FireEyeDaniel Regalado
SUCEFUL: Next Generation ATM Malware
SUCEFUL
2015-09-10FireEyeGenwei Jiang, Josiah Kimble
Hangul Word Processor (HWP)Zero-Day: possible ties to North Korean threat actors
HOPLIGHT
2015-09-09Kaspersky LabsStefan Tanase
Satellite Turla: APT Command and Control in the Sky
Turla
2015-09-09Kaspersky LabsStefan Tanase
Satellite Turla: APT Command and Control in the Sky
Satellite Turla Turla
2015-09-08FireEyeFireEye
Two for One: Microsoft Office Encapsulated PostScriptand Windows Privilege Escalation Zero-Days
REDSALT
2015-09-01Virus BulletinJaromír Hořejší, Peter Kálnai
DDOS TROJAN: A MALICIOUS CONCEPT THAT CONQUERED THE ELF FORMAT
Bashlite MrBlack XOR DDoS BillGates
2015-09-01Trend MicroBenson Sy
Attackers Target Organizations in Japan; Transform Local Sites into C&C Servers for EMDIVI Backdoor
Emdivi
2015-08-31SecurityIntelligenceDenis Laskov, Ilya Kolmanovich, Limor Kessem
Shifu: ‘Masterful’ New Banking Trojan Is Attacking 14 Japanese Banks
Shifu
2015-08-27CitizenLabJohn Scott-Railton, Katie Kleemola
London Calling: Two-Factor Authentication Phishing From Iran
Rocket Kitten
2015-08-27Electronic Frontier FoundationCooper Quintin
New Spear Phishing Campaign Pretends to be EFF
APT28
2015-08-24DarkMattersBev Robb
Sphinx: New Zeus Variant for Sale on the Black Market
Zeus Sphinx
2015-08-19Github (samratashok)Nikil Mittal
Antak WebShell
ANTAK
2015-08-18Github (goliate)goliate
ransomware open-sources
HiddenTear
2015-08-18ByteAtlasDaniel Plohmann
Knowledge Fragment: Unwrapping Fobber
Fobber
2015-08-17F-Secure LabsF-Secure Threat Intelligence Team, Noora Hyvärinen
THE DUKES 7 YEARS OF RUSSIAN CYBERESPIONAGE
COZYDUKE GeminiDuke
2015-08-12WikipediaVarious
Islamic State Hacking Division
Cyber Caliphate Army
2015-08-10Palo Alto Networks Unit 42Ryan Olson
What’s Next in Malware After Kuluoz?
Asprox
2015-08-10Kaspersky LabsGReAT
Darkhotel’s attacks in 2015
DarkHotel DarkHotel
2015-08-05SecureworksCTU Research Team
Threat Group 3390 Cyberespionage
APT27