Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-03-25Palo Alto Networks Unit 42Robert Falcone, Simon Conant
ProjectM: Link Found Between Pakistani Actor and Operation Transparent Tribe
Bozok Operation C-Major
2016-03-24Malwarebyteshasherezade
Maktub Locker – Beautiful And Dangerous
Maktub
2016-03-21AT&T CybersecurityEddie Lee, Krishna Kona
OS X Malware Samples Analyzed
Careto CoinThief FlashBack
2016-03-18WikipediaVarious
Xor DDoS
XOR DDoS
2016-03-15SymantecJon DiMaggio
Suckfly: Revealing the secret life of your code signing certificates
APT22
2016-03-15SymantecJon DiMaggio
Suckfly: Revealing the secret life of your code signing certificates
2016-03-14Trend MicroJoseph C. Chen
Massive Malvertising Campaign in US Leads to Angler Exploit Kit/BEDEP
2016-03-14Palo Alto Networks Unit 42Bryan Lee, Josh Grunzweig, Robert Falcone
Digital Quartermaster Scenario Demonstrated in Attacks Against the Mongolian Government
BBSRAT CMSTAR
2016-03-11Palo Alto Networks Unit 42Brandon Levene, Josh Grunzweig
PowerSniff Malware Used in Macro-based Attacks
2016-03-11Net Tool'zNet Tool'z
Gaudox - HTTP Bot (1.1.0.1) | C++/ASM | Ring3 Rootkit | Watchdog | Antis
Gaudox
2016-03-10ProofpointProofpoint Staff
Death Comes Calling: Thanatos/Alphabot Trojan Hits the Market
Thanatos
2016-03-09SOFTPEDIA® NEWSCatalin Cimpanu
Korean Energy and Transportation Targets Attacked by OnionDog APT
OnionDog
2016-03-07Github (xl7dev)xl7dev
RedHat Hacker.asp
RedHat Hacker WebShell
2016-03-06Github (TKCERT)thyssenkrupp CERT
Network detector for Winnti malware
Winnti
2016-03-06Palo Alto Networks Unit 42Claud Xiao
New OS X Ransomware KeRanger Infected Transmission BitTorrent Client Installer
KeRanger
2016-03-04SANSDavid Martin
Tracing the Lineage of DarkSeoul
httpdropper
2016-03-03Kaspersky LabsMikhail Kuzin, Nikita Buchka
Attack on Zygote: a new twist in the evolution of mobile threats
Triada
2016-03-01Group-IBGroup-IB
BUHTRAP: The Evolution of Targetted Attacks Against Financial Instituitions
BuhTrap
2016-03-01Trend MicroDavid Sancho, Feike Hacquebord
Operation C-Major: Information Theft Campaign Targets Military Personnel in India
Operation C-Major
2016-03-01Malwarebyteshasherezade
Look Into Locky Ransomware
Locky