Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-02-27SymantecA L Johnson
Shamoon: Multi-staged destructive attacks limited to specific targets
DistTrack MimiKatz Rocket Kitten
2017-02-27SophosTed Heppner
Betabot: Configuration Data Extraction
BetaBot
2017-02-27CylanceJon Gross
The Deception Project: A New Japanese-Centric Threat
Snake Wine
2017-02-27Palo Alto Networks Unit 42Anthony Kasza, Dominik Reichel
The Gamaredon Group Toolset Evolution
Gamaredon Group
2017-02-27Benkow LabBenoît Ancel
Spambot safari #2 - Online Mail System
OnlinerSpambot
2017-02-27Threat VectorJon Gross
The Deception Project: A New Japanese-Centric Threat
ChChes Snake Wine
2017-02-27Palo Alto Networks Unit 42Anthony Kasza, Dominik Reichel
The Gamaredon Group Toolset Evolution
Pteranodon
2017-02-27Palo Alto Networks Unit 42Anthony Kasza, Dominik Reichel
The Gamaredon Group Toolset Evolution
Gamaredon Group
2017-02-27MalwarebytesMalwarebytes Labs
New Neutrino Bot comes in a protective loader
Neutrino
2017-02-27SymantecSymantec Security Response
Shamoon: Multi-staged destructive attacks limited to specific targets
Rocket Kitten
2017-02-26Arnaud Delmas
TreasureHunter : A POS Malware Case Study
TreasureHunter
2017-02-25Financial Security InstituteKyoung-Ju Kwak (郭炅周)
Silent RIFLE: Response Against Advanced Threat
Ghost RAT
2017-02-24Some stuff about security.. BlogAngel Alonso
Hunting Retefe with Splunk - some interesting points
Retefe
2017-02-24BitSightSofia Luis
Necurs Proxy Module With DDOS Features
Necurs
2017-02-23Cisco TalosPaul Rascagnères, Warren Mercer
Korean MalDoc Drops Evil New Years Presents
Unidentified 013 (Korean)
2017-02-23ESET ResearchLukáš Štefanko
Released Android malware source code used to run a banking botnet
SpyBanker
2017-02-22Github (kai5263499)kai5263499
Bella: A pure python, post-exploitation, data mining tool and remote administration tool for macOS.
Bella
2017-02-22PhishLabsRaashid Bhat
Dissecting the Qadars Banking Trojan
Qadars
2017-02-22ESET ResearchMarc-Etienne M.Léveillé
New crypto‑ransomware hits macOS
Patcher
2017-02-21JPCERT/CCShusei Tomonaga
PlugX + Poison Ivy = PlugIvy? - PlugX Integrating Poison Ivy’s Code
PlugX