Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-07-12Kaspersky LabsSergey Yunakovsky
The Magala Trojan Clicker: A Hidden Advertising Threat
Magala
2017-07-12MalwarebytesMalwarebytes Labs
A .NET malware abusing legitimate ffmpeg
MobiRAT
2017-07-11G DataG Data
Ordinypt hat es auf Benutzer aus Deutschland abgesehen
Ordinypt
2017-07-11Trend MicroMarshall Chen, Rubio Wu
Spam Campaign Delivers Cross-platform Remote Access Trojan Adwind
AdWind
2017-07-11401 TRGNate Marx, Tom Hegel
Winnti (LEAD/APT17) Evolution - Going Open Source
2017-07-10Secrary BlogSecrary
Upatre - Trojan Downloader
Upatre
2017-07-08InfoSec Handlers Diary BlogXavier Mertens
A VBScript with Obfuscated Base64 Data
Revenge RAT
2017-07-07SWITCH Security BlogMichael Hausding
94 .ch & .li domain names hijacked and used for drive-by
Neutrino
2017-07-06Cisco TalosPaul Rascagnères
New KONNI Campaign References North Korean Missile Capabilities
Konni
2017-07-05Bleeping ComputerLawrence Abrams
New Azer CryptoMix Ransomware Variant Released
CryptoMix
2017-07-05Seebug PaperADLab
Trump Zombies: New IoT Zombies Attacking 'In Trump's Name'
Trump Bot
2017-07-05Cisco TalosAleksandar Nikolic, David Maynor, Matt Olney, Yves Younan
The MeDoc Connection
TeleDoor
2017-07-05Trend MicroMobile Threat Response Team
SLocker Mobile Ransomware Starts Mimicking WannaCry
Slocker
2017-07-05Trend MicroKevin Y. Huang
Security 101: The Impact of Cryptocurrency-Mining Malware
PurpleFox
2017-07-04KasperskyAnton Ivanov, Orkhan Mamedov
In ExPetr/Petya’s shadow, FakeCry ransomware wave hits Ukraine
EternalPetya FakeCry
2017-07-04Malware Traffic AnalysisBrad Duncan
MALSPAM WITH JAVA-BASED RAT
AdWind
2017-07-04WikipediaVarious
Industroyer
Industroyer
2017-07-04McAfeeMcAfee
Important information about Night Dragon
Night Dragon
2017-07-04ESET ResearchAnton Cherepanov
Analysis of TeleBots’ cunning backdoor
TeleDoor
2017-07-03G DataG Data
Who is behind Petna?
EternalPetya