Click here to download all references as Bib-File.•
2016-10-04
⋅
Palo Alto Networks Unit 42
⋅
OilRig Malware Campaign Updates Toolset and Expands Targets Helminth |
2016-10-04
⋅
Palo Alto Networks Unit 42
⋅
OilRig Malware Campaign Updates Toolset and Expands Targets OilRig |
2016-10-03
⋅
Kaspersky Labs
⋅
On the StrongPity Waterhole Attacks Targeting Italian and Belgian Encryption Users StrongPity |
2016-10-01
⋅
CrowdStrike
⋅
2015 Global Threat Report MIMIC SPIDER |
2016-10-01
⋅
Vice Motherboard
⋅
‘Shadow Brokers’ Whine That Nobody Is Buying Their Hacked NSA Files The Shadow Brokers |
2016-09-29
⋅
Kaspersky Labs
⋅
TeamXRat: Brazilian cybercrime meets ransomware Xpan TeamXRat |
2016-09-28
⋅
ThreatConnect
⋅
Belling the BEAR Cyber Berkut |
2016-09-28
⋅
Palo Alto Networks Unit 42
⋅
Confucius Says…Malware Families Get Further By Abusing Legitimate Websites Confucius SNEEPY |
2016-09-27
⋅
Talos Intelligence
⋅
Threat Spotlight: GozNym Nymaim |
2016-09-23
⋅
FireEye
⋅
Hancitor (AKA Chanitor) observed using multiple attack approaches Hancitor |
2016-09-23
⋅
Laanwj's Blog
⋅
SECONDDATE in action Equationgroup (Sorting) |
2016-09-22
⋅
ESET Research
⋅
Book of Eli: African targeted attacks Book of Eli |
2016-09-20
⋅
Avast
⋅
Inside Petya and Mischa ransomware Petya |
2016-09-20
⋅
SecurityIntelligence
⋅
Meanwhile in Britain, Qadars v3 Hardens Evasion, Targets 18 UK Banks Qadars |
2016-09-19
⋅
Trend Micro
⋅
Untangling the Ripper ATM Malware Ripper ATM |
2016-09-17
⋅
A few notes on SECONDDATE's C&C protocol Equationgroup (Sorting) |
2016-09-16
⋅
Zscaler
⋅
iSpy Keylogger iSpy Keylogger |
2016-09-14
⋅
Deloitte
⋅
The evolution of the Nymaim Criminal Enterprise Threat Intelligence & Analytics Nymaim |
2016-09-13
⋅
The curious case of BLATSTING's RSA implementation Equationgroup (Sorting) |
2016-09-11
⋅
Laanwj's Blog
⋅
BUZZDIRECTION: BLATSTING reloaded Equationgroup (Sorting) |