Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-07-27ForbesThomas Brewster
With Fake News And Femmes Fatales, Iran's Spies Learn To Love Facebook
Charming Kitten
2017-07-27Security IntelligenceLimor Kessem, Shachar Gritzman
After Big Takedown Efforts, 20 More BankBot Mobile Malware Apps Make It Into Google Play
Anubis
2017-07-27Palo Alto Networks Unit 42Bryan Lee, Robert Falcone
OilRig Uses ISMDoor Variant; Possibly Linked to Greenbug Threat Group
Greenbug
2017-07-27Trend MicroBenson Sy, CH Lei, Kawabata Kohei
ChessMaster Makes its Move: A Look into the Campaign’s Cyberespionage Arsenal
APT10
2017-07-25Ars TechnicaDan Goodin
“Perverse” malware infecting hundreds of Macs remained undetected for years
FruitFly
2017-07-25ClearSkyClearSky Research Team
Operation Wilted Tulip – Exposing a Cyber Espionage Apparatus
Matryoshka RAT TDTESS CopyKittens
2017-07-25Github (viql)Johannes Bader
Dridex Loot
Dridex
2017-07-25FireEyeSwapnil Patil, Yogesh Londhe
HawkEye Credential Theft Malware Distributed in Recent Phishing Campaign
HawkEye Keylogger
2017-07-25Palo Alto Networks Unit 42Kaoru Hayashi
“Tick” Group Continues Attacks
Daserf Tick
2017-07-25GigamonApplied Threat Research Team
Footprints of Fin7: Tracking Actor Patterns (Part 1)
FIN7
2017-07-24Malware BreakdownMalware Breakdown
The Seamless Campaign Drops Ramnit. Follow-up Malware: AZORult Stealer, Smoke Loader, etc.
Azorult
2017-07-24Vitali Kremez BlogVitali Kremez
Let's Learn: Reversing Credential and Payment Card Information Stealer 'AZORult V2'
Azorult
2017-07-24VolexityVolexity
Real News, Fake Flash: Mac OS X Users Targeted
Leverage
2017-07-24Kaspersky LabsNoushin Shabab
Spring Dragon – Updated Activity
LOTUS PANDA
2017-07-24MalwarebytesMalwarebytes Labs
Bye, bye Petya! Decryptor for old versions released.
Petya
2017-07-20G DataG Data
Rurktar - Spyware under Construction
Rurktar
2017-07-20ESET ResearchFrédéric Vachon, Matthieu Faou
Stantinko: A massive adware campaign operating covertly since 2012
Stantinko
2017-07-19SecurityWeekEduard Kovacs
'DarkHotel' APT Uses New Methods to Target Politicians
DarkHotel
2017-07-19Kaspersky LabsSergey Yunakovsky
The NukeBot banking Trojan: from rough drafts to real threats
TinyNuke
2017-07-18ElasticAshkan Hosseini
Ten process injection techniques: A technical survey of common and trending process injection techniques
Almanahe Diztakun Ginwui