Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-09-16ZscalerAtinderpal Singh
iSpy Keylogger
iSpy Keylogger
2016-09-15Palo Alto Networks Unit 42Kaoru Hayashi
MILE TEA: Cyber Espionage Campaign Targets Asia Pacific Businesses and Government Agencies
Elirks Logedrut Micrass
2016-09-14DeloitteDeloitte
The evolution of the Nymaim Criminal Enterprise Threat Intelligence & Analytics
Nymaim
2016-09-14Trend MicroStephen Hilt, William Gamazo Sanchez
BkSoD by Ransomware: HDDCryptor Uses Commercial Tools to Encrypt Network Shares and Lock HDDs
Mamba
2016-09-13CiscoJosh Reynolds
H1N1: Technical analysis reveals new capabilities
H1N1 Loader
2016-09-13Laanwj
The curious case of BLATSTING's RSA implementation
Equationgroup (Sorting)
2016-09-13Palo Alto Networks Unit 42Claud Xiao
DualToy: New Windows Trojan Sideloads Risky Apps to Android and iOS Devices
DualToy
2016-09-13Palo Alto Networks Unit 42Claud Xiao
DualToy: New Windows Trojan Sideloads Risky Apps to Android and iOS Devices
DualToy DualToy
2016-09-11Laanwj's BlogWladimir J. van der Laan
BUZZDIRECTION: BLATSTING reloaded
Equationgroup (Sorting)
2016-09-11Softpedia NewsCatalin Cimpanu
Free Darktrack RAT Has the Potential of Being the Best RAT on the Market Search
Darktrack RAT
2016-09-11ESET ResearchESET Research
En Route with Sednit - Part 3: A Mysterious Downloader
Downdelph
2016-09-09Kaspersky LabsGReAT
THE PROJECTSAURON APT
ProjectSauron
2016-09-09InfoArmorAndrew Komarov
GOVRAT V2.0 - Attacking US military and government
GovRAT
2016-09-08Dr.WebDr.Web
Doctor Web discovers Linux Trojan written in Rust
Irc16
2016-09-08Bleeping ComputerLawrence Abrams
The Philadelphia Ransomware offers a Mercy Button for Compassionate Criminals
Philadephia Ransom
2016-09-07Virus BulletinBrian Bartholomew, Juan Andrés Guerrero-Saade
Wave Your False Flags! Deception Tactics Muddying Attribution in Targeted Attacks
DuQu JripBot Sinowal Stuxnet Wipbot
2016-09-07Kaspersky LabsStefan Ortloff
The Missing Piece – Sophisticated OS X Backdoor Discovered
Mokes
2016-09-07Twitter (smoothimpact)Kris McConkey
Tweet with hashes on APT3
APT3 Keylogger
2016-09-06SymantecSymantec Security Response
Buckeye cyberespionage group shifts gaze from US to Hong Kong
Giffy
2016-09-06SymantecSecurity Response
Buckeye cyberespionage group shifts gaze from US to Hong Kong
pirpi APT3