Click here to download all references as Bib-File.•
2018-09-17
⋅
Palo Alto Networks Unit 42
⋅
Xbash Combines Botnet, Ransomware, Coinmining in Worm that Targets Linux and Windows Xbash |
2018-09-14
⋅
Cybereason
⋅
Wannamine cryptominer that uses EternalBlue still active WannaMine |
2018-09-14
⋅
⋅
ID Ransomware
⋅
Rektware Ransomware Rektware |
2018-09-14
⋅
NetScout
⋅
Tunneling Under the Sands BONDUPDATER |
2018-09-14
⋅
Bleeping Computer
⋅
Kraken Cryptor Ransomware Masquerading as SuperAntiSpyware Security Program Kraken |
2018-09-13
⋅
FireEye
⋅
APT10 Targeting Japanese Corporations Using Updated TTPs APT10 |
2018-09-12
⋅
Cryptolaemus Pastedump
⋅
Emotet IOC Emotet |
2018-09-12
⋅
Palo Alto Networks Unit 42
⋅
OilRig Uses Updated BONDUPDATER to Target Middle Eastern Government OilRig |
2018-09-12
⋅
Flashpoint
⋅
Malware Campaign Targeting Jaxx Cryptocurrency Wallet Users Shut Down KPOT Stealer |
2018-09-12
⋅
Palo Alto Networks Unit 42
⋅
OilRig Uses Updated BONDUPDATER to Target Middle Eastern Government BONDUPDATER |
2018-09-12
⋅
Bleeping Computer
⋅
Feedify Hacked with Magecart Information Stealing Script MageCart |
2018-09-11
⋅
Sophos Naked Security
⋅
The Rise of Targeted Ransomware Dharma FriedEx SamSam |
2018-09-11
⋅
Securonix
⋅
KRONOS/Osiris Banking Trojan Attack |
2018-09-11
⋅
Proofpoint
⋅
New modular downloaders fingerprint systems - Part 3: CobInt CobInt |
2018-09-11
⋅
Bleeping Computer
⋅
British Airways Fell Victim To Card Scraping Attack MageCart |
2018-09-10
⋅
Security Boulevard
⋅
Android Malware Intercepts SMS 2FA: We have the Logs Anubis |
2018-09-10
⋅
Trend Micro
⋅
A Closer Look at the Locky Poser, PyLocky Ransomware PyLocky |
2018-09-10
⋅
Youtube ( Monnappa K A)
⋅
turla gazer backdoor code injection & winlogon shell persistence Gazer |
2018-09-10
⋅
SecurityIntelligence
⋅
IBM X-Force Delves Into ExoBot’s Leaked Source Code ExoBot |
2018-09-10
⋅
Kaspersky Labs
⋅
LuckyMouse signs malicious NDISProxy driver with certificate of Chinese IT company Unidentified 080 APT27 |