Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-12-07SymantecSymantec
Backdoor.Cadelspy and Backdoor.Remexi: indicators of compromise
CadelSpy Remexi
2015-12-07FlashpointFlashpoint, Talos
Flashpoint and Talos Analyze the Curious Case of the flokibot Connector
FlokiBot
2015-12-04Kaspersky LabsGReAT
Sofacy APT hits high profile targets with updated toolset
Coreshell Sedreco Seduploader X-Agent APT28
2015-12-04Kaspersky LabsGReAT
Sofacy APT hits high profile targets with updated toolset
Sedreco
2015-12-03360 Internet Security CenterYa Liu
Automatically Classifying Unknown Bots by The REGISTER Messages
MrBlack XOR DDoS DarkShell
2015-12-02BotconfPeter Kleissner
Sality: 2003 - Today
Sality
2015-12-01Trend MicroErika Mendoza, Jay Yaneza
Operation Black Atlas Endangers In-Store Card Payments and SMBs Worldwide; Switches between BlackPOS and Other Tools
Alina POS BlackPOS Kronos NewPosThings
2015-12-01FireEyeFireEye Threat Intelligence
China-based Cyber Threat Group Uses Dropbox for Malware Communications and Targets Hong Kong Media Outlets
BUBBLEWRAP LOWBALL TEMPER PANDA
2015-11-300x3A SecurityYonathan Klijnsma
Inside Braviax/FakeRean: An analysis and history of a FakeAV family
2015-11-24FireEyeStephen Ward
ModPOS: Highly-Sophisticated, Stealthy Malware Targeting US POS Systems with High Likelihood of Broader Campaigns
ModPOS
2015-11-23MinervaLabsClearSky, MinervaLabs
CopyKittens Attack Group
CopyKittens
2015-11-20Jos Wetzels
A king's ransom: an analysis of the CTB-locker ransomware
CTB Locker
2015-11-19JPCERT/CCYou Nakatsuru
Decrypting Strings in Emdivi
Emdivi
2015-11-17SpiderLabs BlogEric Merritt
New Memory Scraping Technique in Cherry Picker PoS Malware
CherryPicker POS
2015-11-16Nick Hoffman
Introducing LogPOS
LogPOS
2015-11-16SpiderLabs BlogEric Merritt
Shining the Spotlight on Cherry Picker PoS Malware
CherryPicker POS
2015-11-11ProofpointDarien Huss
AbaddonPOS: A new point of sale threat linked to Vawtrak
AbaddonPOS TinyLoader
2015-11-10Palo Alto Networks Unit 42Juan Cortes, Mike Scott, Robert Falcone
Bookworm Trojan: A Model of Modular Architecture
Bookworm
2015-11-10CERT.PLCERT.PL
Talking to Dridex (part 0) – inside the dropper
Dridex
2015-11-06SecurityIntelligenceShane Schick
OmniRAT Takes Over Android Devices Through Social Engineering Tricks
OmniRAT