Click here to download all references as Bib-File.•
2016-09-16
⋅
Zscaler
⋅
iSpy Keylogger iSpy Keylogger |
2016-09-15
⋅
Palo Alto Networks Unit 42
⋅
MILE TEA: Cyber Espionage Campaign Targets Asia Pacific Businesses and Government Agencies Elirks Logedrut Micrass |
2016-09-14
⋅
Trend Micro
⋅
BkSoD by Ransomware: HDDCryptor Uses Commercial Tools to Encrypt Network Shares and Lock HDDs Mamba |
2016-09-13
⋅
Palo Alto Networks Unit 42
⋅
DualToy: New Windows Trojan Sideloads Risky Apps to Android and iOS Devices DualToy |
2016-09-13
⋅
Palo Alto Networks Unit 42
⋅
DualToy: New Windows Trojan Sideloads Risky Apps to Android and iOS Devices DualToy DualToy |
2016-09-11
⋅
Softpedia News
⋅
Free Darktrack RAT Has the Potential of Being the Best RAT on the Market Search Darktrack RAT |
2016-09-09
⋅
Kaspersky Labs
⋅
THE PROJECTSAURON APT ProjectSauron |
2016-09-09
⋅
InfoArmor
⋅
GOVRAT V2.0 - Attacking US military and government GovRAT |
2016-09-07
⋅
Virus Bulletin
⋅
Wave Your False Flags! Deception Tactics Muddying Attribution in Targeted Attacks DuQu JripBot Sinowal Stuxnet Wipbot |
2016-09-07
⋅
Kaspersky Labs
⋅
The Missing Piece – Sophisticated OS X Backdoor Discovered Mokes |
2016-09-07
⋅
Twitter (smoothimpact)
⋅
Tweet with hashes on APT3 APT3 Keylogger |
2016-09-06
⋅
Symantec
⋅
Buckeye cyberespionage group shifts gaze from US to Hong Kong Giffy |
2016-09-06
⋅
Symantec
⋅
Buckeye cyberespionage group shifts gaze from US to Hong Kong pirpi APT3 |
2016-09-06
⋅
Symantec
⋅
Buckeye cyberespionage group shifts gaze from US to Hong Kong shareip |
2016-09-06
⋅
Symantec
⋅
Buckeye cyberespionage group shifts gaze from US to Hong Kong APT3 Keylogger |
2016-09-06
⋅
⋅
KZ CERT
⋅
KZ-CERT has analyzed another sample of malicious software, which is a component of targeted attacks (Targeted attacks, Advanced Persistent Threats (APT)) Icefog |
2016-09-05
⋅
Trend Micro
⋅
Pokémon-themed Umbreon Linux Rootkit Hits x86, ARM Systems Umbreon |
2016-09-02
⋅
CERT.PL
⋅
Necurs – hybrid spam botnet Necurs |
2016-09-01
⋅
Fs0ciety Locker Fs0ciety |
2016-09-01
⋅
Blueliv
⋅
Chasing Cybercrime: Network insights into Vawtrak v2 Vawtrak |