Click here to download all references as Bib-File.•
2017-05-12
⋅
YouTube (Hack In The Box Security Conference)
⋅
COMMSEC D2 - A Surprise Encounter With A Telco APT |
2017-05-12
⋅
KrebsOnSecurity
⋅
U.K. Hospitals Hit in Widespread Ransomware Attack WannaCryptor |
2017-05-04
⋅
Fidelis Cybersecurity
⋅
Blackmoon Rising: Banking Trojan Back with New Framework KrBanker |
2017-05-02
⋅
360 Core Security
⋅
HackSpy-Trojan-Exploit HackSpy |
2017-04-27
⋅
Homeland Security
⋅
INTRUSIONS AFFECTING MULTIPLE VICTIMS ACROSS MULTIPLE SECTO APT10 |
2017-04-10
⋅
Symantec
⋅
Longhorn: Tools used by cyberespionage group linked to Vault 7 Lambert Longhorn |
2017-04-06
⋅
KrebsOnSecurity
⋅
Self-Proclaimed ‘Nuclear Bot’ Author Weighs U.S. Job Offer TinyNuke |
2017-03-28
⋅
SecurityIntelligence
⋅
The NukeBot Trojan, a Bruised Ego and a Surprising Source Code Leak TinyNuke |
2017-03-13
⋅
Core Security
⋅
Behind a Malware Lifecycle and Infection Chain: Linking Asprox, Zemot, Rovix and Rerdom Malware Families Rerdom |
2017-03-02
⋅
Laboratory of Cryptography and System Security
⋅
Update on the Fancy Bear Android malware (poprd30.apk) X-Agent |
2017-03-01
⋅
KrebsOnSecurity
⋅
Ransomware for Dummies: Anyone Can Do It Philadephia Ransom |
2017-03-01
⋅
SecurityIntelligence
⋅
GootKit Developers Dress It Up With Web Traffic Proxy GootKit |
2017-02-28
⋅
Security Intelligence
⋅
Dridex’s Cold War: Enter AtomBombing Dridex |
2017-02-27
⋅
Symantec
⋅
Shamoon: Multi-staged destructive attacks limited to specific targets Rocket Kitten |
2017-02-25
⋅
Financial Security Institute
⋅
Silent RIFLE: Response Against Advanced Threat Ghost RAT |
2017-02-24
⋅
Some stuff about security.. Blog
⋅
Hunting Retefe with Splunk - some interesting points Retefe |
2017-02-16
⋅
SecurityAffairs
⋅
Iranian hackers behind the Magic Hound campaign linked to Shamoon pupy APT35 |
2017-02-15
⋅
Adventures in Security
⋅
The Rambo Backdoor Rambo |
2017-02-10
⋅
Department of Homeland Security
⋅
AR-17-20045 - Enhanced Analysis of GRIZZLY STEPPE Activity APT29 |
2017-01-27
⋅
Joe's Security
⋅
Deep Analysis of Android Ransom Charger Charger |