Click here to download all references as Bib-File.•
2015-12-07
⋅
Symantec
⋅
Backdoor.Cadelspy and Backdoor.Remexi: indicators of compromise CadelSpy Remexi |
2015-12-07
⋅
Flashpoint
⋅
Flashpoint and Talos Analyze the Curious Case of the flokibot Connector FlokiBot |
2015-12-04
⋅
Kaspersky Labs
⋅
Sofacy APT hits high profile targets with updated toolset Coreshell Sedreco Seduploader X-Agent APT28 |
2015-12-04
⋅
Kaspersky Labs
⋅
Sofacy APT hits high profile targets with updated toolset Sedreco |
2015-12-03
⋅
360 Internet Security Center
⋅
Automatically Classifying Unknown Bots by The REGISTER Messages MrBlack XOR DDoS DarkShell |
2015-12-02
⋅
Botconf
⋅
Sality: 2003 - Today Sality |
2015-12-01
⋅
Trend Micro
⋅
Operation Black Atlas Endangers In-Store Card Payments and SMBs Worldwide; Switches between BlackPOS and Other Tools Alina POS BlackPOS Kronos NewPosThings |
2015-12-01
⋅
FireEye
⋅
China-based Cyber Threat Group Uses Dropbox for Malware Communications and Targets Hong Kong Media Outlets BUBBLEWRAP LOWBALL TEMPER PANDA |
2015-11-30
⋅
0x3A Security
⋅
Inside Braviax/FakeRean: An analysis and history of a FakeAV family |
2015-11-24
⋅
FireEye
⋅
ModPOS: Highly-Sophisticated, Stealthy Malware Targeting US POS Systems with High Likelihood of Broader Campaigns ModPOS |
2015-11-23
⋅
MinervaLabs
⋅
CopyKittens Attack Group CopyKittens |
2015-11-20
⋅
A king's ransom: an analysis of the CTB-locker ransomware CTB Locker |
2015-11-19
⋅
JPCERT/CC
⋅
Decrypting Strings in Emdivi Emdivi |
2015-11-17
⋅
SpiderLabs Blog
⋅
New Memory Scraping Technique in Cherry Picker PoS Malware CherryPicker POS |
2015-11-16
⋅
Introducing LogPOS LogPOS |
2015-11-16
⋅
SpiderLabs Blog
⋅
Shining the Spotlight on Cherry Picker PoS Malware CherryPicker POS |
2015-11-11
⋅
Proofpoint
⋅
AbaddonPOS: A new point of sale threat linked to Vawtrak AbaddonPOS TinyLoader |
2015-11-10
⋅
Palo Alto Networks Unit 42
⋅
Bookworm Trojan: A Model of Modular Architecture Bookworm |
2015-11-10
⋅
CERT.PL
⋅
Talking to Dridex (part 0) – inside the dropper Dridex |
2015-11-06
⋅
SecurityIntelligence
⋅
OmniRAT Takes Over Android Devices Through Social Engineering Tricks OmniRAT |