Click here to download all references as Bib-File.•
2019-03-14
⋅
CISA
⋅
MAR-10135536-12 – North Korean Trojan: TYPEFRAME miniTypeFrame TYPEFRAME |
2019-03-14
⋅
Proofpoint
⋅
Daily Ruleset Update Summary 2019/03/14 CageyChameleon |
2019-03-14
⋅
DCSO
⋅
Pegasus/Buhtrap analysis of the malware stage based on the leaked source code Buhtrap |
2019-03-14
⋅
Trustwave
⋅
Attacker Tracking Users Seeking Pakistani Passport scanbox |
2019-03-13
⋅
Cylance
⋅
BlackBerry Cylance vs. Tinba Banking Trojan Tinba |
2019-03-13
⋅
MyOnlineSecurity
⋅
Fake CDC Flu Pandemic Warning delivers Gandcrab 5.2 ransomware Cold$eal Gandcrab |
2019-03-13
⋅
0ffset Blog
⋅
Analysing ISFB – The First Loader ISFB |
2019-03-13
⋅
Pentest Blog
⋅
N Ways to Unpack Mobile Malware Anubis |
2019-03-13
⋅
Security Art Work
⋅
ORANGEWORM GROUP – KWAMPIRS ANALYSIS UPDATE Kwampirs |
2019-03-13
⋅
Twitter (@WDSecurity)
⋅
Tweet on Tefosteal TefoSteal |
2019-03-13
⋅
Kaspersky Labs
⋅
The fourth horseman: CVE-2019-0797 vulnerability Stealth Falcon |
2019-03-13
⋅
Proofpoint
⋅
DanaBot control panel revealed DanaBot |
2019-03-13
⋅
Flashpoint
⋅
‘DMSniff’ POS Malware Actively Leveraged to Target Small-, Medium-Sized Businesses DMSniff |
2019-03-13
⋅
Cisco Talos
⋅
GlitchPOS: New PoS malware for sale GlitchPOS |
2019-03-12
⋅
Proofpoint
⋅
Nymaim config decoded Nymaim |
2019-03-12
⋅
Malwarebytes
⋅
The Advanced Persistent Threat files: Lazarus Group Lazarus Group |
2019-03-12
⋅
Cybereason
⋅
New Ursnif Variant targets Japan packed with new Features ISFB UrlZone |
2019-03-12
⋅
Palo Alto Networks Unit 42
⋅
Operation Comando: How to Run a Cheap and Effective Credit Card Business Operation Comando |
2019-03-11
⋅
ESET Research
⋅
Gaming industry still in the scope of attackers in Asia APT41 |
2019-03-11
⋅
Threatpost
⋅
Researcher Claims Iranian APT Behind 6TB Data Heist at Citrix IRIDIUM |