Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-02-14Palo Alto Networks Unit 42Robert Falcone
XAgentOSX: Sofacy’s XAgent macOS Tool
X-Agent
2017-02-13RSARSA Research
KINGSLAYER – A SUPPLY CHAIN ATTACK
CodeKey PlugX
2017-02-12BAE SystemsBAE Systems Applied Intelligence
Lazarus & Watering-hole attacks
Ratankba
2017-02-12SymantecA L Johnson
Attackers target dozens of global banks with new malware
Ratankba Lazarus Group
2017-02-12SymantecA L Johnson
Attackers target dozens of global banks with new malware
Joanap Ratankba Sierra(Alfa,Bravo, ...) Lazarus Group
2017-02-10Wapack LabsAnonymous
Rebranding iSpy Keylogger: Gear Informer
GearInformer
2017-02-06Iran ThreatsClaudio Guarnieri, Collin Anderson
iKittens: Iranian Actor Resurfaces with Malware for Mac (MacDownloader)
MacDownloader Charming Kitten
2017-02-06Bleeping ComputerCatalin Cimpanu
Polish Banks Infected with Malware Hosted on Their Own Government's Site
2017-02-05VinRansomwareGregory Paul, Shaunak
Detailed threat analysis of Shamoon 2.0 Malware
DistTrack
2017-02-05IDFIDF
Hamas Uses Fake Facebook Profiles to Target Israeli Soldiers
GlanceLove
2017-02-04de VolkskrantHuib Modderkolk
Russen faalden bij hackpogingen ambtenaren op Nederlandse ministeries
APT28
2017-02-03Manuel K.-B.
Zeus Panda Webinjects: a case study
PandaBanker
2017-02-02Kaspersky LabsBrian Bartholomew
KopiLuwak: A New JavaScript Payload from Turla
KopiLuwak
2017-02-01ESET ResearchJean-Ian Boutin, Matthieu Faou
Read The Manual: A Guide to the RTM Banking Trojan
RTM RTM
2017-01-31SANS ISC InfoSec ForumsJohannes
Malicious Office files using fileless UAC bypass to drop KEYBASE malware
KeyBase
2017-01-31MalwarebytesMalwarebytes Labs
Locky Bart ransomware and backend server analysis
Locky
2017-01-30CERT.PLJarosław Jedynak
Nymaim revisited
Nymaim
2017-01-30Palo Alto Networks Unit 42Mashav Sapir, Netanel Rimer, Simon Conant, Taras Malivanchuk, Tomer Bar, Yaron Samuel
Downeks and Quasar RAT Used in Recent Targeted Attacks Against Governments
Downeks
2017-01-30Palo Alto Networks Unit 42Mashav Sapir, Netanel Rimer, Simon Conant, Taras Malivanchuk, Tomer Bar, Yaron Samuel
Downeks and Quasar RAT Used in Recent Targeted Attacks Against Governments
Quasar RAT
2017-01-26FortinetKai Lu
Deep Analysis of Android Rootnik Malware Using Advanced Anti-Debug and Anti-Hook, Part I: Debugging in The Scope of Native Layer
Rootnik