Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-10-09Palo Alto Networks Unit 42Josh Grunzweig
Latest TeslaCrypt Ransomware Borrows Code From Carberp Trojan
TeslaCrypt
2015-10-08Virus BulletinEric Leung, Micky Pun, Neo Tan
Catching the silent whisper: Understanding the Derusbi family tree
Derusbi
2015-10-08enSiloYotam Gottesman
MOKER, PART 2: CAPABILITIES
Moker
2015-10-07Dell SecureworksDell Secureworks CTU
Hacker Group Creates Network of Fake LinkedIn Profiles
Cleaver
2015-10-07SecureworksCTU Research Team
Hacker Group Creates Network of Fake LinkedIn Profiles
Cleaver Cutting Kitten
2015-10-06Palo Alto Networks Unit 42Richard Wartell
Ticked Off: Upatre Malware’s Simple Anti-analysis Trick to Defeat Sandboxes
Upatre
2015-10-06NetenrichNetenrich
CUTTING KITTEN
TinyZbot Cleaver
2015-10-06Kaspersky LabsDmitry Tarakanov
I am HDRoot! Part 1
HDRoot
2015-10-06enSiloYotam Gottesman
MOKER, PART 1: DISSECTING A NEW APT UNDER THE MICROSCOPE
Moker
2015-10-06ThreatpostMichael Mimoso
Targeted Attack Exposes OWA Weakness
owaauth
2015-10-06enSiloYotam Gottesman
MOKER: A NEW APT DISCOVERED WITHIN A SENSITIVE NETWORK
Moker
2015-10-01Dr. WebDr. Web
Linux.Rekoobe.1
Rekoobe
2015-10-01Check PointAliaksandr Trafimchuk, Stanislav Skuratovich
Digging for Groundhogs: Holes in your Linux server
XOR DDoS
2015-09-28Trend MicroTrend Micro Forward Looking Research Team
Two New PoS Malware Affecting US SMBs
Alina POS
2015-09-28Kaspersky LabsGhareeb Saad, Mohamad Amin Hasbini
Gaza cybergang, where’s your IR team?
Molerats
2015-09-24Trend MicroMichael Marcos, RonJay Caragay
Credit Card-Scraping Kasidet Builder Leads to Spike in Detections
Neutrino
2015-09-24SymantecSymantec Security Response
Kovter malware learns from Poweliks with persistent fileless registry update
Kovter
2015-09-23Palo Alto Networks Unit 42Jen Miller-Osborn, Robert Falcone
Chinese Actors Use ‘3102’ Malware in Attacks on US Government and EU Media
9002 RAT
2015-09-23Palo Alto Networks Unit 42Jen Miller-Osborn, Robert Falcone
Chinese Actors Use ‘3102’ Malware in Attacks on US Government and EU Media
APT.3102
2015-09-18ProofpointProofpoint Staff
Operation Arid Viper Slithers Back into View
AridViper