Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-03-04BriMor LabsBriMor Labs
@online{labs:20150304:you:edeb053, author = {BriMor Labs}, title = {{And you get a POS malware name...and you get a POS malware name....and you get a POS malware name....}}, date = {2015-03-04}, organization = {BriMor Labs}, url = {https://www.brimorlabsblog.com/2015/03/and-you-get-pos-malware-nameand-you-get.html}, language = {English}, urldate = {2019-11-29} } And you get a POS malware name...and you get a POS malware name....and you get a POS malware name....
pwnpos
2015-03-04Malware Don't Need CoffeeKafeine
@online{kafeine:20150304:new:0c67206, author = {Kafeine}, title = {{New crypto ransomware in town : CryptoFortress}}, date = {2015-03-04}, organization = {Malware Don't Need Coffee}, url = {http://malware.dontneedcoffee.com/2015/03/cryptofortress-teeraca-aka.html}, language = {English}, urldate = {2019-11-29} } New crypto ransomware in town : CryptoFortress
2015-03-03Blaze's Security BlogBartBlaze
@online{bartblaze:20150303:c99shell:a7f3a5b, author = {BartBlaze}, title = {{C99Shell not dead}}, date = {2015-03-03}, organization = {Blaze's Security Blog}, url = {https://bartblaze.blogspot.com/2015/03/c99shell-not-dead.html}, language = {English}, urldate = {2020-01-13} } C99Shell not dead
c99shell
2015-03-03Trend MicroJay Yaneza
@online{yaneza:20150303:pwnpos:06159b8, author = {Jay Yaneza}, title = {{PwnPOS: Old Undetected PoS Malware Still Causing Havoc}}, date = {2015-03-03}, organization = {Trend Micro}, url = {https://blog.trendmicro.com/trendlabs-security-intelligence/pwnpos-old-undetected-pos-malware-still-causing-havoc/}, language = {English}, urldate = {2019-10-25} } PwnPOS: Old Undetected PoS Malware Still Causing Havoc
pwnpos
2015-02-27ThreatConnectThreatConnect Research Team
@online{team:20150227:anthem:3576532, author = {ThreatConnect Research Team}, title = {{The Anthem Hack: All Roads Lead to China}}, date = {2015-02-27}, organization = {ThreatConnect}, url = {https://www.threatconnect.com/the-anthem-hack-all-roads-lead-to-china/}, language = {English}, urldate = {2020-01-09} } The Anthem Hack: All Roads Lead to China
Derusbi
2015-02-27InfoSec InstituteRyan Mazerik
@online{mazerik:20150227:scanbox:867abf2, author = {Ryan Mazerik}, title = {{ScanBox Framework}}, date = {2015-02-27}, organization = {InfoSec Institute}, url = {http://resources.infosecinstitute.com/scanbox-framework/}, language = {English}, urldate = {2020-01-13} } ScanBox Framework
scanbox
2015-02-27ThreatConnectThreatConnect Research Team
@online{team:20150227:anthem:ac7d814, author = {ThreatConnect Research Team}, title = {{The Anthem Hack: All Roads Lead to China}}, date = {2015-02-27}, organization = {ThreatConnect}, url = {https://threatconnect.com/blog/the-anthem-hack-all-roads-lead-to-china/}, language = {English}, urldate = {2020-04-06} } The Anthem Hack: All Roads Lead to China
HttpBrowser
2015-02-27Virus BulletinMicky Pun, Neo Tan
@online{pun:20150227:vb2014:66e07ea, author = {Micky Pun and Neo Tan}, title = {{VB2014 paper: The pluginer - Caphaw}}, date = {2015-02-27}, organization = {Virus Bulletin}, url = {https://www.virusbulletin.com/virusbulletin/2015/02/paper-pluginer-caphaw}, language = {English}, urldate = {2019-12-18} } VB2014 paper: The pluginer - Caphaw
Shylock
2015-02-25Github (nyx0)nyx0
@online{nyx0:20150225:pony:17f5bd3, author = {nyx0}, title = {{Pony Sourcecode}}, date = {2015-02-25}, organization = {Github (nyx0)}, url = {https://github.com/nyx0/Pony}, language = {English}, urldate = {2020-01-09} } Pony Sourcecode
Pony
2015-02-25Github (nyx0)unknown
@online{unknown:20150225:kins:534edd1, author = {unknown}, title = {{KINS Banking Trojan Source Code}}, date = {2015-02-25}, organization = {Github (nyx0)}, url = {https://github.com/nyx0/KINS}, language = {English}, urldate = {2019-11-29} } KINS Banking Trojan Source Code
KINS
2015-02-25Trend MicroTrend Micro Threat Research Team
@techreport{team:20150225:operation:3300d1e, author = {Trend Micro Threat Research Team}, title = {{OPERATION ARID VIPER: Bypassing the Iron Dome}}, date = {2015-02-25}, institution = {Trend Micro}, url = {http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-arid-viper.pdf}, language = {English}, urldate = {2020-01-09} } OPERATION ARID VIPER: Bypassing the Iron Dome
AridViper
2015-02-24SymantecSymantec Security Response
@techreport{response:20150224:w32ramnit:3a2fed3, author = {Symantec Security Response}, title = {{W32.Ramnit analysis}}, date = {2015-02-24}, institution = {Symantec}, url = {https://www.symantec.com/content/dam/symantec/docs/security-center/white-papers/w32-ramnit-analysis-15-en.pdf}, language = {English}, urldate = {2019-12-17} } W32.Ramnit analysis
Ramnit
2015-02-23CrowdStrikeAdam Kozy
@online{kozy:20150223:cyber:d6b26b8, author = {Adam Kozy}, title = {{Cyber Kung-Fu: The Great Firewall Art of DNS Poisoning}}, date = {2015-02-23}, organization = {CrowdStrike}, url = {https://www.crowdstrike.com/blog/cyber-kung-fu-great-firewall-art-dns-poisoning/}, language = {English}, urldate = {2020-05-11} } Cyber Kung-Fu: The Great Firewall Art of DNS Poisoning
2015-02-19Security AffairsPierluigi Paganini
@online{paganini:20150219:arid:c2612d7, author = {Pierluigi Paganini}, title = {{Arid Viper – Israel entities targeted by malware packaged with sex video}}, date = {2015-02-19}, organization = {Security Affairs}, url = {http://securityaffairs.co/wordpress/33785/cyber-crime/arid-viper-israel-sex-video.html}, language = {English}, urldate = {2020-01-06} } Arid Viper – Israel entities targeted by malware packaged with sex video
AridViper
2015-02-18Trend MicroTrendmicro
@online{trendmicro:20150218:sexually:52507ce, author = {Trendmicro}, title = {{Sexually Explicit Material Used as Lures in Recent Cyber Attacks}}, date = {2015-02-18}, organization = {Trend Micro}, url = {https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/sexually-explicit-material-used-as-lures-in-cyber-attacks?linkId=12425812}, language = {English}, urldate = {2020-01-08} } Sexually Explicit Material Used as Lures in Recent Cyber Attacks
AridViper
2015-02-18CyphortMarion Marschalek
@online{marschalek:20150218:shooting:91fead0, author = {Marion Marschalek}, title = {{Shooting Elephants}}, date = {2015-02-18}, organization = {Cyphort}, url = {https://drive.google.com/a/cyphort.com/file/d/0B9Mrr-en8FX4dzJqLWhDblhseTA/}, language = {English}, urldate = {2020-01-08} } Shooting Elephants
Babar
2015-02-18CyphortMarion Marschalek
@online{marschalek:20150218:babar:f8c92b6, author = {Marion Marschalek}, title = {{Babar: Suspected Nation State Spyware In The Spotlight}}, date = {2015-02-18}, organization = {Cyphort}, url = {https://web.archive.org/web/20150218192803/http://www.cyphort.com/babar-suspected-nation-state-spyware-spotlight/}, language = {English}, urldate = {2020-06-08} } Babar: Suspected Nation State Spyware In The Spotlight
Babar Evilbunny SNOWGLOBE
2015-02-18Vice MotherboardLorenzo Franceschi-Bicchierai
@online{franceschibicchierai:20150218:meet:2f64fcb, author = {Lorenzo Franceschi-Bicchierai}, title = {{Meet Babar, a New Malware Almost Certainly Created by France}}, date = {2015-02-18}, organization = {Vice Motherboard}, url = {https://motherboard.vice.com/read/meet-babar-a-new-malware-almost-certainly-created-by-france}, language = {English}, urldate = {2020-01-10} } Meet Babar, a New Malware Almost Certainly Created by France
SNOWGLOBE
2015-02-18G DataG Data
@online{data:20150218:babar:24e6c08, author = {G Data}, title = {{Babar: espionage software finally found and put under the microscope}}, date = {2015-02-18}, organization = {G Data}, url = {https://www.gdatasoftware.com/blog/2015/02/24270-babar-espionage-software-finally-found-and-put-under-the-microscope}, language = {English}, urldate = {2019-12-02} } Babar: espionage software finally found and put under the microscope
Evilbunny SNOWGLOBE
2015-02-17SecurityAffairsPierluigi Paganini
@online{paganini:20150217:ali:b9323a0, author = {Pierluigi Paganini}, title = {{Ali Baba, the APT group from the Middle East}}, date = {2015-02-17}, organization = {SecurityAffairs}, url = {https://securityaffairs.co/wordpress/33682/cyber-crime/ali-baba-apt-middle-east.html}, language = {English}, urldate = {2022-07-29} } Ali Baba, the APT group from the Middle East
Cleaver