Click here to download all references as Bib-File.•
2014-12-01
⋅
SecurityKitten Blog
⋅
LusyPOS and Tor |
2014-11-25
⋅
Adventures in Security
⋅
Curious Korlia Korlia |
2014-11-10
⋅
Blaze's Security Blog
⋅
Thoughts on Absolute Computrace Computrace |
2014-10-14
⋅
Symantec
⋅
Security vendors take action against Hidden Lynx malware Gameover P2P HiKit Shylock APT17 |
2014-10-14
⋅
Symantec
⋅
Sandworm Windows zero-day vulnerability being actively exploited in targeted attacks Sandworm |
2014-10-14
⋅
Symantec
⋅
Sandworm Windows zero-day vulnerability being actively exploited in targeted attacks Sandworm |
2014-10-14
⋅
Symantec
⋅
Security vendors take action against Hidden Lynx malware HiKit |
2014-09-22
⋅
SecurityIntelligence
⋅
Tinba Malware Reloaded and Attacking Banks Around the World Tinba |
2014-08-20
⋅
ThisIsSecurity
⋅
Command Line Confusion Poweliks |
2014-08-01
⋅
Coding and Security
⋅
Soraya Malware Analysis - Dropper soraya |
2014-07-11
⋅
SecurityIntelligence
⋅
The Father of Zeus: Kronos Malware Discovered |
2014-07-07
⋅
Symantec
⋅
Dragonfly: Cyberespionage Attacks Against Energy Suppliers Karagany ENERGETIC BEAR |
2014-07-07
⋅
Symantec
⋅
Dragonfly: Cyberespionage Attacks Against Energy Suppliers ENERGETIC BEAR |
2014-07-07
⋅
CrowdStrike
⋅
Deep in Thought: Chinese Targeting of National Security Think Tanks APT19 |
2014-06-09
⋅
SecurityIntelligence
⋅
ZeuS.Maple Variant Targets Canadian Online Banking Customers KINS |
2014-05-22
⋅
SecurityIntelligence
⋅
Meet the Zberp Trojan VM Zeus |
2014-01-21
⋅
Sophos Naked Security
⋅
Digitally signed data-stealing malware targets Mac users in “undelivered courier item” attack Laoshu |
2013-09-17
⋅
Symantec
⋅
Hidden Lynx – Professional Hackers for Hire APT17 |
2013-09-17
⋅
Symantec
⋅
Hidden Lynx – Professional Hackers for Hire |
2013-08-13
⋅
KrebsOnSecurity
⋅
Inside a ‘Reveton’ Ransomware Operation Reveton |