Click here to download all references as Bib-File.•
2015-11-24
⋅
FireEye
⋅
ModPOS: Highly-Sophisticated, Stealthy Malware Targeting US POS Systems with High Likelihood of Broader Campaigns ModPOS |
2015-11-23
⋅
MinervaLabs
⋅
CopyKittens Attack Group CopyKittens |
2015-11-19
⋅
JPCERT/CC
⋅
Decrypting Strings in Emdivi Emdivi |
2015-11-11
⋅
ESET Research
⋅
Operation Buhtrap malware distributed via ammyy.com BuhTrap |
2015-11-11
⋅
Proofpoint
⋅
AbaddonPOS: A new point of sale threat linked to Vawtrak AbaddonPOS TinyLoader |
2015-11-06
⋅
SecurityIntelligence
⋅
OmniRAT Takes Over Android Devices Through Social Engineering Tricks OmniRAT |
2015-11-04
⋅
Check Point
⋅
“Offline” Ransomware Encrypts Your Data without C&C Communication Cryakl |
2015-11-04
⋅
Malwarebytes
⋅
A Technical Look At Dyreza Dyre |
2015-11-04
⋅
Avast
⋅
DroidJack isn’t the only spying software out there: Avast discovers OmniRat OmniRAT |
2015-10-28
⋅
Reversing the C2C HTTP Emmental communication Retefe |
2015-10-22
⋅
Trend Micro
⋅
Pawn Storm Targets MH17 Investigation Team APT28 |
2015-10-16
⋅
Palo Alto Networks Unit 42
⋅
Surveillance Malware Trends: Tracking Predator Pain and HawkEye HawkEye Keylogger |
2015-10-13
⋅
Secureworks
⋅
Dridex (Bugat v5) Botnet Takeover Operation Dridex Evil Corp |
2015-10-09
⋅
Palo Alto Networks Unit 42
⋅
Latest TeslaCrypt Ransomware Borrows Code From Carberp Trojan TeslaCrypt |
2015-10-08
⋅
Proofpoint
⋅
Dyre Malware Campaigners Innovate with Distribution Techniques Gophe |
2015-10-08
⋅
Virus Bulletin
⋅
Catching the silent whisper: Understanding the Derusbi family tree Derusbi |
2015-10-07
⋅
Dell Secureworks
⋅
Hacker Group Creates Network of Fake LinkedIn Profiles Cleaver |
2015-10-07
⋅
Secureworks
⋅
Hacker Group Creates Network of Fake LinkedIn Profiles Cleaver Cutting Kitten |
2015-10-06
⋅
Palo Alto Networks Unit 42
⋅
Ticked Off: Upatre Malware’s Simple Anti-analysis Trick to Defeat Sandboxes Upatre |
2015-10-06
⋅
Threatpost
⋅
Targeted Attack Exposes OWA Weakness owaauth |