Click here to download all references as Bib-File.•
2018-03-09
⋅
ESET Research
⋅
New traces of Hacking Team in the wild RCS Hacking Team |
2018-03-08
⋅
NetScout
⋅
Donot Team Leverages New Modular Malware Framework in South Asia yty |
2018-03-08
⋅
Avast
⋅
New investigations into the CCleaner incident point to a possible third stage that had keylogger capacities CCleaner Backdoor |
2018-03-08
⋅
Kaspersky Labs
⋅
The devil’s in the Rich header Olympic Destroyer |
2018-03-08
⋅
Kaspersky Labs
⋅
OlympicDestroyer is here to trick the industry Olympic Destroyer |
2018-03-08
⋅
NetScout
⋅
Donot Team Leverages New Modular Malware Framework in South Asia VICEROY TIGER |
2018-03-08
⋅
McAfee
⋅
Hidden Cobra Targets Turkish Financial Sector With New Bankshot Implant Lazarus Group |
2018-03-07
⋅
Proofpoint
⋅
Leaked Ammyy Admin Source Code Turned into Malware FlawedAmmyy QuantLoader |
2018-03-07
⋅
Palo Alto Networks Unit 42
⋅
Patchwork Continues to Deliver BADNEWS to the Indian Subcontinent BadNews |
2018-03-06
⋅
Twitter (@demonslay335)
⋅
Tweet on Cryakl Cryakl |
2018-03-06
⋅
Malware “TSCookie” PLEAD |
2018-03-06
⋅
Cisco Talos
⋅
Gozi ISFB Remains Active in 2018, Leverages "Dark Cloud" Botnet For Distribution ISFB |
2018-03-05
⋅
Confiant
⋅
Zirconium was one step ahead of Chrome’s redirect blocker with 0-day HURRICANE PANDA |
2018-03-05
⋅
Github (TKCERT)
⋅
Suricata rules to detect Winnti communication Winnti |
2018-03-05
⋅
Palo Alto Networks Unit 42
⋅
Sure, I’ll take that! New ComboJack Malware Alters Clipboards to Steal Cryptocurrency Combojack |
2018-03-04
⋅
Youtube (OALabs)
⋅
Unpacking Gootkit Malware With IDA Pro and X64dbg - Subscriber Request Cold$eal GootKit |
2018-03-02
⋅
eideon blog
⋅
Tales of a Threat Hunter 2 Following the trace of WMI Backdoors & other nastiness |
2018-03-02
⋅
KrabsOnSecurity
⋅
Analysing Remcos RAT’s executable Remcos |
2018-03-01
⋅
Security 0wnage
⋅
A Quick Dip into MuddyWater's Recent Activity POWERSTATS |
2018-03-01
⋅
Kaspersky Labs
⋅
The 'Icefog' APT: A Tale of Cloak and Three Daggers DAGGER PANDA |