Click here to download all references as Bib-File.•
2016-08-01
⋅
ESET Research
⋅
En Route with Sednit - Part 1: Approaching the Target Komplex Seduploader |
2016-07-13
⋅
Microsoft
⋅
Troldesh ransomware influenced by (the) Da Vinci code Troldesh |
2016-07-12
⋅
Fidelis Cybersecurity
⋅
Me and Mr. Robot: Tracking the Actor Behind the MAN1 Crypter Hancitor Vawtrak |
2016-07-06
⋅
ESET Research
⋅
New OSX/Keydnap malware is hungry for credentials Keydnap |
2016-06-09
⋅
Microsoft
⋅
Reverse-engineering DUBNIUM DarkHotel |
2016-06-08
⋅
ClearSky
⋅
Operation DustySky Part 2 Molerats |
2016-05-18
⋅
ESET Research
⋅
Operation Groundbait: Espionage in Ukrainian war zones Groundbait |
2016-05-17
⋅
ESET Research
⋅
Operation Groundbait: Analysis of a surveillance toolkit Prikormka |
2016-04-28
⋅
Cisco Talos
⋅
Research Spotlight: The Resurgence of Qbot QakBot |
2016-04-26
⋅
Microsoft
⋅
Digging deep for PLATINUM PLATINUM |
2016-03-30
⋅
Secureworks
⋅
Ransomware Deployed by Adversary with Established Foothold MimiKatz reGeorg SamSam BOSS SPIDER |
2016-03-23
⋅
ESET Research
⋅
New self‑protecting USB trojan able to avoid detection Arefty ThumbThief |
2016-01-27
⋅
Fidelis Cybersecurity
⋅
Introducing Hi-Zor RAT Hi-Zor RAT |
2016-01-01
⋅
ClearSky
⋅
Operation DustySky Molerats |
2015-12-16
⋅
ESET Research
⋅
Nemucod malware spreads ransomware Teslacrypt around the world TeslaCrypt |
2015-11-11
⋅
ESET Research
⋅
Operation Buhtrap malware distributed via ammyy.com BuhTrap |
2015-10-07
⋅
Secureworks
⋅
Hacker Group Creates Network of Fake LinkedIn Profiles Cleaver Cutting Kitten |
2015-09-28
⋅
Trend Micro
⋅
Two New PoS Malware Affecting US SMBs Alina POS |
2015-09-08
⋅
ESET Research
⋅
Carbanak gang is back and packing new guns DRIFTPIN |
2015-08-05
⋅
Secureworks
⋅
Threat Group 3390 Cyberespionage APT27 |