Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-08-01Intel SecurityGuilherme Venere, Mark Olea, Sanchit Karve
DIVING INTO PINKSLIPBOT’S LATEST CAMPAIGN
QakBot
2016-08-01Black HatClaudio Guarnieri, Collin Anderson
Iran and the Soft Warfor Internet Dominance
Infy Sima
2016-08-01ZscalerDeepen Desai
Agent Tesla Keylogger delivered using cybersquatting
Agent Tesla
2016-07-31Security AffairsPierluigi Paganini
China 1937CN Team Hackers Attack Airports in Vietnam
1937CN
2016-07-28BlackberryJim Walter
Petya and Mischa For All Part II: They’re Here…
Petya
2016-07-26Palo Alto Networks Unit 42Jen Miller-Osborn, Robert Falcone
Attack Delivers ‘9002’ Trojan Through Google Drive
2016-07-26ProofpointProofpoint
Threat Actors Using Legitimate PayPal Accounts To Distribute Chthonic Banking Trojan
Azorult Chthonic
2016-07-25SymantecSymantec
Patchwork cyberespionage group expands targets from governments to wide range of industries
QUILTED TIGER
2016-07-25SymantecJoji Hamada
Patchwork cyberespionage group expands targets from governments to wide range of industries
2016-07-21McAfeeMohinder Gill, Oliver Devane
Phishing Attacks Employ Old but Effective Password Stealer
ISR Stealer
2016-07-21KrebsOnSecurityBrian Krebs
Canadian Man Behind Popular ‘Orcus RAT’
Orcus RAT
2016-07-20Trend MicroKawabata Kohei
CrypMIC Ransomware Wants to Follow CryptXXX’s Footsteps
CrypMic
2016-07-18MalwarebytesMalwarebytes Labs
Third time (un)lucky – improved Petya is out
Petya
2016-07-14Github (nccgroup)NCC Group PLC
Technical Notes on Sakula
Sakula RAT
2016-07-14MalwarebytesMalwarebytes Labs
Untangling Kovter’s persistence methods
Kovter
2016-07-12Fidelis CybersecurityThreat Research Team
Me and Mr. Robot: Tracking the Actor Behind the MAN1 Crypter
Hancitor Vawtrak
2016-07-08SecurityIntelligenceLimor Kessem
GootKit: Bobbing and Weaving to Avoid Prying Eyes
GootKit
2016-07-08Kaspersky LabsGReAT
The Dropping Elephant – aggressive cyber-espionage in the Asian region
QUILTED TIGER
2016-07-08Palo Alto Networks Unit 42Josh Grunzweig
Investigating the LuminosityLink Remote Access Trojan Configuration
Luminosity RAT
2016-07-07Pierluigi Paganini
New threat dubbed Zepto Ransomware is spreading out with a new email spam campaign. It is a variant of the recent Locky Ransomware.
Locky