Click here to download all references as Bib-File.•
2015-03-04
⋅
Kaspersky Labs
⋅
Who’s Really Spreading through the Bright Star? Jaku |
2015-03-04
⋅
Malware Don't Need Coffee
⋅
New crypto ransomware in town : CryptoFortress |
2015-02-27
⋅
ThreatConnect
⋅
The Anthem Hack: All Roads Lead to China HttpBrowser |
2015-02-27
⋅
InfoSec Institute
⋅
ScanBox Framework scanbox |
2015-02-27
⋅
ThreatConnect
⋅
The Anthem Hack: All Roads Lead to China Derusbi |
2015-02-27
⋅
Virus Bulletin
⋅
VB2014 paper: The pluginer - Caphaw Shylock |
2015-02-25
⋅
Github (nyx0)
⋅
KINS Banking Trojan Source Code KINS |
2015-02-23
⋅
CrowdStrike
⋅
Cyber Kung-Fu: The Great Firewall Art of DNS Poisoning |
2015-02-19
⋅
Security Affairs
⋅
Arid Viper – Israel entities targeted by malware packaged with sex video AridViper |
2015-02-18
⋅
Cyphort
⋅
Babar: Suspected Nation State Spyware In The Spotlight Babar Evilbunny SNOWGLOBE |
2015-02-18
⋅
Trend Micro
⋅
Sexually Explicit Material Used as Lures in Recent Cyber Attacks AridViper |
2015-02-18
⋅
Cyphort
⋅
Shooting Elephants Babar |
2015-02-17
⋅
Avast
⋅
Angry Android hacker hides Xbot malware in popular application icons Xbot |
2015-02-17
⋅
Kaspersky Labs
⋅
The Desert Falcons targeted attacks AridViper |
2015-02-17
⋅
Kaspersky Labs
⋅
BE2 extraordinary plugins, Siemens targeting, dev fails BlackEnergy |
2015-02-16
⋅
Kaspersky Labs
⋅
Equation: The Death Star of Malware Galaxy DoubleFantasy EquationDrug Fanny GROK |
2015-02-16
⋅
Kaspersky Labs
⋅
Equation: The Death Star of Malware Galaxy Fanny |
2015-02-16
⋅
Ars Technica
⋅
How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last Equation Group |
2015-02-15
⋅
Wikipedia
⋅
Carbanak FIN7 |
2015-02-12
⋅
Trend Micro
⋅
Mobile Malware Gang Steals Millions from South Korean Users Yanbian Gang |