Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2014-12-01SecurityKitten BlogNick Hoffman
LusyPOS and Tor
2014-11-25Adventures in SecurityNick Hoffman
Curious Korlia
Korlia
2014-11-10Blaze's Security BlogBartBlaze
Thoughts on Absolute Computrace
Computrace
2014-10-14SymantecSymantec Security Response
Security vendors take action against Hidden Lynx malware
Gameover P2P HiKit Shylock APT17
2014-10-14SymantecSymantec Security Response
Sandworm Windows zero-day vulnerability being actively exploited in targeted attacks
Sandworm
2014-10-14SymantecSymantec Security Response
Sandworm Windows zero-day vulnerability being actively exploited in targeted attacks
Sandworm
2014-10-14SymantecSymantec Security Response
Security vendors take action against Hidden Lynx malware
HiKit
2014-09-22SecurityIntelligenceAssaf Regev, Tal Darsan
Tinba Malware Reloaded and Attacking Banks Around the World
Tinba
2014-08-20ThisIsSecurityBenkow
Command Line Confusion
Poweliks
2014-08-01Coding and SecurityCoding, Security
Soraya Malware Analysis - Dropper
soraya
2014-07-11SecurityIntelligenceEtay Maor
The Father of Zeus: Kronos Malware Discovered
2014-07-07SymantecSecurity Response
Dragonfly: Cyberespionage Attacks Against Energy Suppliers
Karagany ENERGETIC BEAR
2014-07-07SymantecSymantec Security Response
Dragonfly: Cyberespionage Attacks Against Energy Suppliers
ENERGETIC BEAR
2014-07-07CrowdStrikeDmitri Alperovitch
Deep in Thought: Chinese Targeting of National Security Think Tanks
APT19
2014-06-09SecurityIntelligenceDana Tamir
ZeuS.Maple Variant Targets Canadian Online Banking Customers
KINS
2014-05-22SecurityIntelligenceDana Tamir
Meet the Zberp Trojan
VM Zeus
2014-01-21Sophos Naked SecurityPaul Ducklin
Digitally signed data-stealing malware targets Mac users in “undelivered courier item” attack
Laoshu
2013-09-17SymantecSymantec Security Response
Hidden Lynx – Professional Hackers for Hire
APT17
2013-09-17SymantecSecurity Response
Hidden Lynx – Professional Hackers for Hire
2013-08-13KrebsOnSecurityBrian Krebs
Inside a ‘Reveton’ Ransomware Operation
Reveton