Click here to download all references as Bib-File.•
2018-05-14
⋅
Lookout
⋅
Stealth Mango & Tangelo Technical Report Stealth Mango |
2018-05-14
⋅
FireEye
⋅
A Deep Dive Into RIG Exploit Kit Delivering Grobios Trojan Ngioweb |
2018-05-12
⋅
Random RE
⋅
MS Crypto Derive Functions |
2018-05-12
⋅
Security 0wnage
⋅
PRB-Backdoor - A Fully Loaded PowerShell Backdoor with Evil Intentions prb_backdoor |
2018-05-11
⋅
Think Big
⋅
New report: Malware attacks Chilean banks and bypasses SmartScreen, by exploiting DLL Hijacking within popular software N40 |
2018-05-11
⋅
SOC Prime
⋅
Attackers Exploit DLL Hijacking to Bypass SmartScreen N40 |
2018-05-10
⋅
Flashpoint
⋅
TreasureHunter Point-of-Sale Malware and Builder Source Code Leaked TreasureHunter |
2018-05-09
⋅
Kaspersky
⋅
The King is dead. Long live the King! |
2018-05-09
⋅
COUNT UPON SECURITY
⋅
Malware Analysis - PlugX - Part 2 PlugX |
2018-05-09
⋅
F5
⋅
Panda Malware Broadens Targets to Cryptocurrency Exchanges and Social Media |
2018-05-09
⋅
Cisco Talos
⋅
Gandcrab Ransomware Walks its Way onto Compromised Sites Gandcrab |
2018-05-08
⋅
Security 0wnage
⋅
Clearing the MuddyWater - Analysis of new MuddyWater Samples POWERSTATS |
2018-05-08
⋅
AP News
⋅
Russian hackers posed as IS to threaten military wives APT28 |
2018-05-08
⋅
Bleeping Computer
⋅
"Hide and Seek" Becomes First IoT Botnet Capable of Surviving Device Reboots Hide and Seek |
2018-05-07
⋅
Bitdefender
⋅
Hide and Seek IoT Botnet resurfaces with new tricks, persistence Hide and Seek |
2018-05-07
⋅
Kaspersky Labs
⋅
SynAck targeted ransomware uses the Doppelgänging technique SynAck |
2018-05-07
⋅
European Association for Secure Transactions
⋅
EAST Publishes European Fraud Update 2-2018 WinPot |
2018-05-04
⋅
Avast
⋅
Botception with Necurs: Botnet distributes script with bot capabilities Necurs |
2018-05-03
⋅
Kaspersky Labs
⋅
Who’s who in the Zoo ZooPark ZooPark |
2018-05-03
⋅
McAfee
⋅
Dissecting Operation Troy: Cyberespionage in South Korea concealment_troy http_troy Lazarus Group |