Click here to download all references as Bib-File.•
2016-08-17
⋅
Kaspersky Labs
⋅
Operation Ghoul: targeted attacks on industrial and engineering organizations OpGhoul |
2016-08-16
⋅
SecurityIntelligence
⋅
Brazil Can’t Catch a Break: After Panda Comes the Sphinx Zeus OpenSSL |
2016-08-16
⋅
Palo Alto Networks Unit 42
⋅
Aveo Malware Family Targets Japanese Speaking Users Aveo |
2016-08-15
⋅
Malwarebytes
⋅
Shakti Trojan: Document Thief Shakti |
2016-08-13
⋅
CrowdStrike
⋅
Detecting and Responding: Pandas and Bears FOXY PANDA POISONUS PANDA |
2016-08-10
⋅
⋅
CERT.PL
⋅
CryptXXX \ CrypMIC – intensywnie dystrybuowany ransomware w ramach exploit-kitów CrypMic CryptXXXX |
2016-08-08
⋅
Kaspersky Labs
⋅
ProjectSauron: top level cyber-espionage platform covertly extracts encrypted government comms ProjectSauron |
2016-08-08
⋅
Symantec
⋅
Backdoor.Remsec indicators of compromise Remsec |
2016-08-05
⋅
Malwarebytes
⋅
Smoke Loader – downloader with a smokescreen still alive SmokeLoader |
2016-08-04
⋅
Panda Security
⋅
What is Multigrain? Learn what makes this PoS malware different Multigrain POS |
2016-08-04
⋅
SecurityWeek
⋅
Iranian Actor "Group5" Targeting Syrian Opposition Group5 |
2016-08-02
⋅
Palo Alto Networks Unit 42
⋅
Orcus – Birth of an unusual plugin builder RAT Orcus RAT |
2016-08-01
⋅
CrowdStrike
⋅
CrowdStrike’s New Methodology for Tracking eCrime Corebot BOSON SPIDER |
2016-08-01
⋅
Uperesia
⋅
Analysis of a packed Pony downloader Pony |
2016-08-01
⋅
Malwarebytes
⋅
Shakti Trojan: Technical Analysis Shakti |
2016-08-01
⋅
Intel Security
⋅
DIVING INTO PINKSLIPBOT’S LATEST CAMPAIGN QakBot |
2016-08-01
⋅
Black Hat
⋅
Iran and the Soft Warfor Internet Dominance Infy Sima |
2016-08-01
⋅
Zscaler
⋅
Agent Tesla Keylogger delivered using cybersquatting Agent Tesla |
2016-07-31
⋅
Security Affairs
⋅
China 1937CN Team Hackers Attack Airports in Vietnam 1937CN |
2016-07-28
⋅
Blackberry
⋅
Petya and Mischa For All Part II: They’re Here… Petya |