Click here to download all references as Bib-File.•
| 2016-04-22
            
            ⋅
            
            Palo Alto Networks Unit 42
            ⋅
            
             New Poison Ivy RAT Variant Targets Hong Kong Pro-Democracy Activists Poison Ivy  | 
| 2016-04-21
            
            ⋅
            
            Threatpost
            ⋅
            
             PoS Attacks Net Crooks 20 Million Stolen Bank Cards Vawtrak  | 
| 2016-04-19
            
            ⋅
            
            Endgame
            ⋅
            
             Your Package Has Been Successfully Encrypted: TeslaCrypt 4.1A and the Malware Attack Chain TeslaCrypt  | 
| 2016-04-19
            
            ⋅
            
            FireEye
            ⋅
            
             MULTIGRAIN – Point of Sale Attackers Make an Unhealthy Addition to the Pantry Multigrain POS  | 
| 2016-04-15
            
            ⋅
            
            FireEye
            ⋅
            
             2016 THREAT BRIEFING: “GOOD ENOUGH” IS NOT GOOD ENOUGH Poldat  | 
| 2016-04-11
            
            ⋅
            
            G Data
            ⋅
            
             Manamecrypt – a ransomware that takes a different route ManameCrypt  | 
| 2016-04-07
            
            ⋅
            
            Threatpost
            ⋅
            
             FBI Quietly Admits to Multi-Year APT Attack, Sensitive Data Stolen APT6  | 
| 2016-04-06
            
            ⋅
            
            Cylance
            ⋅
            
             Operation Cleaver Cleaver  | 
| 2016-04-06
            
            ⋅
            
            Avast
            ⋅
            
             Andromeda under the microscope Andromeda  | 
| 2016-04-06
            
            ⋅
            
            Cylance
            ⋅
            
             Operation Cleaver CsExt Jasus KAgent NetC PvzOut SynFlooder TinyZbot WndTest ZhCat ZhMimikatz Cleaver  | 
| 2016-04-06
            
            ⋅
            
            Proofpoint
            ⋅
            
             Locky Ransomware Is Becoming More Sophisticated - Cybercriminals Continue Email Campaign Innovation Rockloader  | 
| 2016-04-06
            
            ⋅
            
            Cybereason
            ⋅
            
             OSX Pirrit: What adware that 'just' displays ads means for Mac OS X security Pirrit  | 
| 2016-04-04
            
            ⋅
            
            Akamai
            ⋅
            
             Threat Advisory: “BillGates” Botnet BillGates  | 
| 2016-04-01
            
            ⋅
            
            FireEye
            ⋅
            
             Follow the Money: Dissecting the Operations of the Cyber Crime Group FIN6 Grateful POS FIN6  | 
| 2016-03-30
            
            ⋅
            
            Secureworks
            ⋅
            
             Ransomware Deployed by Adversary with Established Foothold MimiKatz reGeorg SamSam BOSS SPIDER  | 
| 2016-03-29
            
            ⋅
            
            ThreatVector
            ⋅
            
             Ransomware Update: Today’s Bountiful Cornucopia of Extortive Threats PowerWare  | 
| 2016-03-25
            
            ⋅
            
            Palo Alto Networks Unit 42
            ⋅
            
             ProjectM: Link Found Between Pakistani Actor and Operation Transparent Tribe Bozok Operation C-Major  | 
| 2016-03-21
            
            ⋅
            
            AT&T Cybersecurity
            ⋅
            
             OS X Malware Samples Analyzed Careto CoinThief FlashBack  | 
| 2016-03-15
            
            ⋅
            
            Symantec
            ⋅
            
             Suckfly: Revealing the secret life of your code signing certificates APT22  | 
| 2016-03-15
            
            ⋅
            
            Symantec
            ⋅
            
             Suckfly: Revealing the secret life of your code signing certificates  |