Click here to download all references as Bib-File.•
2018-05-09
⋅
COUNT UPON SECURITY
⋅
Malware Analysis - PlugX - Part 2 PlugX |
2018-05-09
⋅
F5
⋅
Panda Malware Broadens Targets to Cryptocurrency Exchanges and Social Media |
2018-05-09
⋅
Cisco Talos
⋅
Gandcrab Ransomware Walks its Way onto Compromised Sites Gandcrab |
2018-05-08
⋅
Security 0wnage
⋅
Clearing the MuddyWater - Analysis of new MuddyWater Samples POWERSTATS |
2018-05-08
⋅
AP News
⋅
Russian hackers posed as IS to threaten military wives APT28 |
2018-05-08
⋅
Bleeping Computer
⋅
"Hide and Seek" Becomes First IoT Botnet Capable of Surviving Device Reboots Hide and Seek |
2018-05-07
⋅
Bitdefender
⋅
Hide and Seek IoT Botnet resurfaces with new tricks, persistence Hide and Seek |
2018-05-07
⋅
Kaspersky Labs
⋅
SynAck targeted ransomware uses the Doppelgänging technique SynAck |
2018-05-07
⋅
European Association for Secure Transactions
⋅
EAST Publishes European Fraud Update 2-2018 WinPot |
2018-05-04
⋅
Avast
⋅
Botception with Necurs: Botnet distributes script with bot capabilities Necurs |
2018-05-03
⋅
Kaspersky Labs
⋅
Who’s who in the Zoo ZooPark ZooPark |
2018-05-03
⋅
McAfee
⋅
Dissecting Operation Troy: Cyberespionage in South Korea concealment_troy http_troy Lazarus Group |
2018-05-03
⋅
Kaspersky Labs
⋅
WHO’S WHO IN THEZOO. CYBERESPIONAGE OPERATION TARGETS ANDROID USERS IN THE MIDDLE EAST. ZooPark |
2018-05-03
⋅
Kaspersky Labs
⋅
Who’s who in the Zoo ZooPark |
2018-05-03
⋅
Twitter (@thor_scanner)
⋅
Empire Downloader Empire Downloader |
2018-05-03
⋅
ProtectWise
⋅
Burning Umbrella: An Intelligence Report on the Winnti Umbrella and Associated State-Sponsored Attackers APT41 |
2018-05-01
⋅
FireEye
⋅
M-Trends May 2018: From the field Operation C-Major |
2018-05-01
⋅
NetScout
⋅
Lojack Becomes a Double-Agent Computrace |
2018-05-01
⋅
Trend Micro
⋅
Legitimate Application AnyDesk Bundled with New Ransomware Variant BlackRouter |
2018-05-01
⋅
Sophos
⋅
VPNFilter Botnet - a SophosLabs Analysis VPNFilter |