Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-03-16ThreatpostMichael Mimoso
Fileless Malware Campaigns Tied to Same Attacker
FIN7
2017-03-15Trend MicroTrend Micro Cyber Safety Solutions Team
MajikPOS Combines PoS Malware and RATs to Pull Off its Malicious Tricks
MajikPos
2017-03-15FortinetAxelle Apvrille
Teardown of Android/Ztorg (Part 2)
Ztorg
2017-03-15Palo Alto Networks Unit 42Josh Grunzweig
NexusLogger: A New Cloud-based Keylogger Enters the Market
NexusLogger
2017-03-15Bleeping ComputerLawrence Abrams
Revenge Ransomware, a CryptoMix Variant, Being Distributed by RIG Exploit Kit
CryptoShield
2017-03-15FortinetAxelle Apvrille
Teardown of a Recent Variant of Android/Ztorg (Part 1)
Ztorg
2017-03-15Github (MinervaLabsResearch)Minerva Labs
Vaccinating against Spora ransomware: a proof-of-concept tool by Minerva
Spora
2017-03-14FireEyeFireEye
M-Trend 2017: A View From the Front Lines
DistTrack Powersniff FIN8
2017-03-14ClearSkyClearSky Research Team
Operation Electric Powder – Who is targeting Israel Electric Company?
Molerat Loader
2017-03-14Arnaud DelmasArnaud Delmas
Analyzing and Deobfuscating FlokiBot Banking Trojan
FlokiBot
2017-03-14Broad AnalysisBroad Analysis
Rig Exploit Kit via the EiTest delivers CryptoShield/REVENGE ransomware
CryptoShield
2017-03-14Kaspersky LabsAnton Ivanov, Fedor Sinitsyn
PetrWrap: the new Petya-based ransomware used in targeted attacks
PetrWrap
2017-03-14ClearSkyClearSky Research Team
Operation Electric Powder – Who is targeting Israel Electric Company?
ElectricPowder
2017-03-13MorphisecRoy Moshailov
Moving Target Defense Blog
Andromeda
2017-03-13Manuel K.-B.
Zeus Panda Webinjects: Don’t trust your eyes
PandaBanker
2017-03-13Core SecurityCore Security
Behind a Malware Lifecycle and Infection Chain: Linking Asprox, Zemot, Rovix and Rerdom Malware Families
Rerdom
2017-03-13GoogleBernhard Grill, Megan Ruthven, Xin Zhao
Detecting and eliminating Chamois, a fraud botnet on Android
Chamois
2017-03-11Marc Maiffret's BlogMarc Maiffret
Wikileaks Vault7 JQJSNICKER code leak
JQJSNICKER
2017-03-10MalwarebytesMalwarebytes Labs
Explained: Spora ransomware
Spora
2017-03-10Check PointCheck Point
Preinstalled Malware Targeting Mobile Users
Loki