Click here to download all references as Bib-File.•
2012-12-12
⋅
Volatility Labs
⋅
Unpacking Dexter POS "Memory Dump Parsing" Malware Dexter |
2012-12-03
⋅
F-Secure
⋅
New Mac Malware Found on Dalai Lama Related Website Dockster |
2012-11-29
⋅
Trend Micro
⋅
What’s the Fuss with WORM_VOBFUS? Vobfus |
2012-11-27
⋅
Sophos
⋅
Threat Description: Troj/Ployx-A ployx |
2012-11-22
⋅
Symantec
⋅
W32.Narilam – Business Database Sabotage Narilam |
2012-11-16
⋅
Symantec
⋅
Malware Targeting Windows 8 Uses Google Docs Makadocs |
2012-11-16
⋅
Github (DesignativeDave)
⋅
Remote Administration Tool for Android devices AndroRAT |
2012-11-16
⋅
Information on Security Blog
⋅
China Chopper Webshell - the 4KB that Owns your Web Server |
2012-11-05
⋅
Malwarebytes
⋅
Citadel: a cyber-criminal’s ultimate weapon? Citadel |
2012-10-12
⋅
The Mac Security Blog
⋅
New Multiplatform Backdoor Jacksbot Discovered jRAT |
2012-10-09
⋅
Trend Micro
⋅
BKDR_SARHUST.A Sarhust |
2012-09-28
⋅
Dancho Danchev's Blog
⋅
Dissecting 'Operation Ababil' - an OSINT Analysis Cyber fighters of Izz Ad-Din Al Qassam |
2012-08-23
⋅
Trend Micro
⋅
The Taidoor Campaign: AN IN-DEPTH ANALYSIS taidoor Taidoor |
2012-08-20
⋅
Symantec
⋅
Crisis for Windows Sneaks onto Virtual Machines Crisis RCS |
2012-08-16
⋅
Symantec
⋅
The Shamoon Attacks DistTrack OilRig |
2012-08-16
⋅
Symantec
⋅
The Shamoon Attacks OilRig |
2012-08-16
⋅
Kaspersky Labs
⋅
Shamoon the Wiper – Copycats at Work DistTrack |
2012-08-10
⋅
Contagiodump Blog
⋅
Gauss samples - Nation-state cyber-surveillance + Banking trojan Gauss |
2012-08-03
⋅
Contagio Dump
⋅
Cridex Analysis using Volatility Feodo |
2012-08-02
⋅
Cridex Analysis using Volatility Feodo |