Click here to download all references as Bib-File.•
2017-06-12
⋅
⋅
Security Art Work
⋅
Evolución de Trickbot TrickBot |
2017-06-02
⋅
SecurityIntelligence
⋅
QakBot Banking Trojan Causes Massive Active Directory Lockouts QakBot |
2017-05-25
⋅
Symantec
⋅
Lazarus: History of mysterious group behind infamous cyber attacks Lazarus Group |
2017-05-22
⋅
Symantec
⋅
WannaCry: Ransomware attacks show strong links to Lazarus group AlphaNC BravoNC Duuzer Sierra(Alfa,Bravo, ...) WannaCryptor |
2017-05-12
⋅
YouTube (Hack In The Box Security Conference)
⋅
COMMSEC D2 - A Surprise Encounter With A Telco APT |
2017-05-12
⋅
KrebsOnSecurity
⋅
U.K. Hospitals Hit in Widespread Ransomware Attack WannaCryptor |
2017-05-04
⋅
Fidelis Cybersecurity
⋅
Blackmoon Rising: Banking Trojan Back with New Framework KrBanker |
2017-05-02
⋅
360 Core Security
⋅
HackSpy-Trojan-Exploit HackSpy |
2017-04-27
⋅
Homeland Security
⋅
INTRUSIONS AFFECTING MULTIPLE VICTIMS ACROSS MULTIPLE SECTO APT10 |
2017-04-10
⋅
Symantec
⋅
Longhorn: Tools used by cyberespionage group linked to Vault 7 Lambert Longhorn |
2017-04-06
⋅
KrebsOnSecurity
⋅
Self-Proclaimed ‘Nuclear Bot’ Author Weighs U.S. Job Offer TinyNuke |
2017-03-28
⋅
SecurityIntelligence
⋅
The NukeBot Trojan, a Bruised Ego and a Surprising Source Code Leak TinyNuke |
2017-03-13
⋅
Core Security
⋅
Behind a Malware Lifecycle and Infection Chain: Linking Asprox, Zemot, Rovix and Rerdom Malware Families Rerdom |
2017-03-02
⋅
Laboratory of Cryptography and System Security
⋅
Update on the Fancy Bear Android malware (poprd30.apk) X-Agent |
2017-03-01
⋅
KrebsOnSecurity
⋅
Ransomware for Dummies: Anyone Can Do It Philadephia Ransom |
2017-03-01
⋅
SecurityIntelligence
⋅
GootKit Developers Dress It Up With Web Traffic Proxy GootKit |
2017-02-28
⋅
Security Intelligence
⋅
Dridex’s Cold War: Enter AtomBombing Dridex |
2017-02-27
⋅
Symantec
⋅
Shamoon: Multi-staged destructive attacks limited to specific targets Rocket Kitten |
2017-02-25
⋅
Financial Security Institute
⋅
Silent RIFLE: Response Against Advanced Threat Ghost RAT |
2017-02-24
⋅
Some stuff about security.. Blog
⋅
Hunting Retefe with Splunk - some interesting points Retefe |