Click here to download all references as Bib-File.•
2017-06-20
⋅
Proofpoint
⋅
AdGholas Malvertising Campaign Using Astrum EK to Deliver Mole Ransomware Mole |
2017-06-19
⋅
root9b
⋅
SHELLTEA + POSLURP Malware Memory-resident Point-of-Sale Malware Attacks Industry PoSlurp FIN8 |
2017-06-19
⋅
root9b
⋅
SHELLTEA + POSLURP Malware Memory-resident Point-of-Sale Malware Attacks Industry FIN8 |
2017-06-19
⋅
Trend Micro
⋅
Erebus Resurfaces as Linux Ransomware Erebus |
2017-06-19
⋅
Cisco Talos
⋅
Delphi Used To Score Against Palestine The Big Bang |
2017-06-19
⋅
Cisco Talos
⋅
Delphi Used To Score Against Palestine Micropsia AridViper |
2017-06-16
⋅
FireEye
⋅
FIN10: Anatomy of a Cyber Extortion Operation FIN10 |
2017-06-15
⋅
Github (ch0sys)
⋅
DUBrute DUBrute |
2017-06-15
⋅
F5
⋅
Trickbot Expands Global Targets Beyond Banks and Payment Processors to CRMs TrickBot |
2017-06-15
⋅
Zeus Sphinx Pushes Empty Configuration Files — What Has the Sphinx Got Cooking? Zloader |
2017-06-14
⋅
Youtube (hasherezade)
⋅
Unpacking YoungLotus malware YoungLotus |
2017-06-14
⋅
ThreatConnect
⋅
Phantom of the Opaera: New KASPERAGENT Malware Campaign KasperAgent AridViper |
2017-06-13
⋅
Dragos
⋅
CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations ENERGETIC BEAR |
2017-06-13
⋅
Dragos
⋅
CRASHOVERRIDE: Analysis of the Threatto Electric Grid Operations Industroyer Sandworm |
2017-06-13
⋅
US-CERT
⋅
HIDDEN COBRA – North Korea’s DDoS Botnet Infrastructure Lazarus Group |
2017-06-13
⋅
Cylance
⋅
Threat Spotlight: Breaking Down FF-Rat Malware FormerFirstRAT |
2017-06-12
⋅
ESET Research
⋅
WIN32/INDUSTROYER: A new threat for industrial control systems Industroyer Sandworm |
2017-06-12
⋅
Bellingcat
⋅
Bahamut, Pursuing a Cyber Espionage Actor in the Middle East Bahamut Bahamut Bahamut |
2017-06-12
⋅
SlideShare
⋅
Open Source Malware - Sharing is caring? HiddenTear |
2017-06-12
⋅
⋅
Security Art Work
⋅
Evolución de Trickbot TrickBot |