Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-07-20G DataG Data
Rurktar - Spyware under Construction
Rurktar
2017-07-20ESET ResearchFrédéric Vachon, Matthieu Faou
Stantinko: A massive adware campaign operating covertly since 2012
Stantinko
2017-07-19SecurityWeekEduard Kovacs
'DarkHotel' APT Uses New Methods to Target Politicians
DarkHotel
2017-07-19Kaspersky LabsSergey Yunakovsky
The NukeBot banking Trojan: from rough drafts to real threats
TinyNuke
2017-07-18ElasticAshkan Hosseini
Ten process injection techniques: A technical survey of common and trending process injection techniques
Almanahe Diztakun Ginwui
2017-07-18ElasticAshkan Hosseini
Ten process injection techniques: A technical survey of common and trending process injection techniques
Cryakl CyberGate Dridex FinFisher RAT Locky
2017-07-18BitdefenderAlexandru Maximciuc, Alexandru Rusu, Cristina Vatamanu
Inexsmar: An unusual DarkHotel campaign
DarkHotel
2017-07-18Trend MicroBrian Cayanan, Mohamad Mokbel, Tim Yeh
Linux Users Urged to Update as a New Threat Exploits SambaCry
ShellBind
2017-07-18EndgameAshkan Hosseini
Ten Process Injection Techniques: A Technical Survey of Common and Trending Process Injection Techniques
CyberGate
2017-07-17MalwarebytesThreat Intelligence Team
It’s baaaack: Public cyber enemy Emotet has returned
Emotet
2017-07-17Trend MicroCedric Pernet, Jordan Pan, Lenart Bermejo
Android Backdoor GhostCtrl can Silently Record Your Audio, Video, and More
GhostCtrl
2017-07-17Secrary BlogLasha Khasaia
WMIGhost / Wimmie - WMI malware
WMI Ghost
2017-07-17Twitter (@LukasStefanko)Lukáš Štefanko
Tweet on Flexnet Sample
FlexNet
2017-07-15Github (jgamblin)Jerry Gamblin
Mirai BotNet Source Code
Mirai
2017-07-14MalwarebytesMalwarebytes Labs
Keeping up with the Petyas: Demystifying the malware family
EternalPetya GoldenEye PetrWrap Petya
2017-07-13Check PointOfer Caspi
OSX/Dok Refuses to Go Away and It’s After Your Money
2017-07-13ProofpointProofpoint Staff
Meet Ovidiy Stealer: Bringing credential theft to the masses
OvidiyStealer
2017-07-12CybereasonIsrael Barak
Operation Escalation: How click-fraud malware transforms into an advanced threat
Kovter
2017-07-12WiredLily Hay Newman
Iranian Hackers Have Been Infiltrating Critical Infrastructure Companies
OilRig
2017-07-12NetScoutDennis Schwarz
LockPoS Joins the Flock
LockPOS