Click here to download all references as Bib-File.•
2017-04-03
⋅
Kaspersky Labs
⋅
Moonlight Maze Technical Report (Appendix B) Penquin Turla |
2017-04-03
⋅
Malware Breakdown
⋅
Shadow Server Domains Leading to RIG Exploit Kit Dropping Smoke Loader. Downloaded Neutrino Bot (AKA Kasidet). Neutrino |
2017-04-01
⋅
Lookout
⋅
Pegasus for Android: Technical Analysis and Findings of Chrysaor Chrysaor |
2017-03-30
⋅
ClearSky
⋅
Jerusalem Post and other Israeli websites compromised by Iranian threat agent CopyKitten CopyKittens |
2017-03-30
⋅
EquationDrug rootkit analysis (mstcp32.sys) EquationDrug |
2017-03-30
⋅
Palo Alto Networks Unit 42
⋅
Trochilus and New MoonWind RATs Used In Attack Against Thai Organizations MoonWind |
2017-03-30
⋅
Palo Alto Networks Unit 42
⋅
Trochilus and New MoonWind RATs Used In Attack Against Thai Organizations APT9 |
2017-03-30
⋅
ESET Research
⋅
Carbon Paper: Peering into Turla’s second stage backdoor Cobra Carbon System Turla |
2017-03-29
⋅
Forcepoint
⋅
Trojanized Adobe installer used to install DragonOK’s new custom backdoor KHRAT DragonOK |
2017-03-29
⋅
Imperva
⋅
New Mirai Variant Launches 54 Hour DDoS Attack against US College Mirai |
2017-03-28
⋅
SecurityIntelligence
⋅
The NukeBot Trojan, a Bruised Ego and a Surprising Source Code Leak TinyNuke |
2017-03-28
⋅
Palo Alto Networks Unit 42
⋅
Dimnie: Hiding in Plain Sight Dimnie |
2017-03-27
⋅
Twitter (@michalmalik)
⋅
Tweet on Linux IRC Bot Xaynnalc |
2017-03-26
⋅
Palo Alto Networks Unit 42
⋅
Shamoon 2: Delivering Disttrack DistTrack |
2017-03-24
⋅
Terror EK via Malvertising delivers Tofsee Spambot Tofsee |
2017-03-23
⋅
Cofense
⋅
Tales from the Trenches: Loki Bot Malware Loki Password Stealer (PWS) |
2017-03-22
⋅
Cylance
⋅
El Machete's Malware Attacks Cut Through LATAM Machete El Machete |
2017-03-22
⋅
Cylance
⋅
El Machete's Malware Attacks Cut Through LATAM El Machete |
2017-03-21
⋅
Wired
⋅
Inside the Hunt for Russia’s Most Notorious Hacker Gameover P2P Murofet Zeus |
2017-03-21
⋅
DomainTools
⋅
Hunt Case Study: Hunting Campaign Indicators on Privacy Protected Attack Infrastructure CopyKittens |