Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-02-16SecurityAffairsPierluigi Paganini
Iranian hackers behind the Magic Hound campaign linked to Shamoon
pupy APT35
2017-02-15Adventures in SecurityNick Hoffman
The Rambo Backdoor
Rambo
2017-02-10Department of Homeland SecurityCommunications Integration Center, National Cybersecurity
AR-17-20045 - Enhanced Analysis of GRIZZLY STEPPE Activity
APT29
2017-01-27Joe's SecurityJoe
Deep Analysis of Android Ransom Charger
Charger
2017-01-26SecurityIntelligenceLimor Kessem
Around the World With Zeus Sphinx: From Canada to Australia and Back
Zloader
2017-01-23SymantecSymantec Security Response
Greenbug cyberespionage group targeting Middle East, possible links to Shamoon
DistTrack ISMDoor Greenbug
2017-01-23SymantecSymantec Security Response
Greenbug cyberespionage group targeting Middle East, possible links to Shamoon
DistTrack ISMDoor Greenbug
2017-01-10SecurityIntelligenceLimor Kessem, Lior Keshet
Client Maximus: New Remote Overlay Malware Highlights Rising Malcode Sophistication in Brazil
Client Maximus
2017-01-05ReutersJ.R. Wu, Jim Finkle
Taiwan ATM heist linked to European hacking spree: security firm
Cobalt
2017-01-04SecurityIntelligenceLior Keshet
Exposing an AV-Disabling Driver Just in Time for Lunch
AvastDisabler
2016-12-29Errata SecurityRobert Graham
Some notes on IoCs
PAS
2016-12-29Department of Homeland SecurityDepartment of Homeland Security
GRIZZLY STEPPE – Russian Malicious Cyber Activity
PAS
2016-12-16SymantecSymantec Security Response
Bayrob: Three suspects extradited to face charges in US
SuppoBox
2016-12-14Kaspersky LabsKaspersky
Kaspersky Security Bulletin 2016. Review of the year. Overall statistics for 2016
Operation Ghoul
2016-12-14Adventures in SecurityNick Hoffman
MiKey - A Linux keylogger
MiKey
2016-12-03Coding and SecurityCoding, Security
"Sophisticated" and "Genius" Shamoon 2.0 Malware Analysis
DistTrack
2016-11-30SymantecSymantec Security Response
Shamoon: Back from the dead and destructive as ever
OilRig
2016-11-28SecurityKitten BlogNick Hoffman
The KLRD Keylogger
KLRD
2016-11-22Help Net SecurityZeljka Zorz
Cobalt hackers executed massive, synchronized ATM heists across Europe, Russia
Cobalt
2016-11-09Fidelis CybersecurityThreat Research Team
Down the H-W0rm Hole with Houdini’s RAT
Blackworm RAT