Click here to download all references as Bib-File.•
2017-03-16
⋅
Threatpost
⋅
Fileless Malware Campaigns Tied to Same Attacker FIN7 |
2017-03-15
⋅
Trend Micro
⋅
MajikPOS Combines PoS Malware and RATs to Pull Off its Malicious Tricks MajikPos |
2017-03-15
⋅
Fortinet
⋅
Teardown of Android/Ztorg (Part 2) Ztorg |
2017-03-15
⋅
Palo Alto Networks Unit 42
⋅
NexusLogger: A New Cloud-based Keylogger Enters the Market NexusLogger |
2017-03-15
⋅
Bleeping Computer
⋅
Revenge Ransomware, a CryptoMix Variant, Being Distributed by RIG Exploit Kit CryptoShield |
2017-03-15
⋅
Fortinet
⋅
Teardown of a Recent Variant of Android/Ztorg (Part 1) Ztorg |
2017-03-15
⋅
Github (MinervaLabsResearch)
⋅
Vaccinating against Spora ransomware: a proof-of-concept tool by Minerva Spora |
2017-03-14
⋅
FireEye
⋅
M-Trend 2017: A View From the Front Lines DistTrack Powersniff FIN8 |
2017-03-14
⋅
ClearSky
⋅
Operation Electric Powder – Who is targeting Israel Electric Company? Molerat Loader |
2017-03-14
⋅
Arnaud Delmas
⋅
Analyzing and Deobfuscating FlokiBot Banking Trojan FlokiBot |
2017-03-14
⋅
Broad Analysis
⋅
Rig Exploit Kit via the EiTest delivers CryptoShield/REVENGE ransomware CryptoShield |
2017-03-14
⋅
Kaspersky Labs
⋅
PetrWrap: the new Petya-based ransomware used in targeted attacks PetrWrap |
2017-03-14
⋅
ClearSky
⋅
Operation Electric Powder – Who is targeting Israel Electric Company? ElectricPowder |
2017-03-13
⋅
Morphisec
⋅
Moving Target Defense Blog Andromeda |
2017-03-13
⋅
Zeus Panda Webinjects: Don’t trust your eyes PandaBanker |
2017-03-13
⋅
Core Security
⋅
Behind a Malware Lifecycle and Infection Chain: Linking Asprox, Zemot, Rovix and Rerdom Malware Families Rerdom |
2017-03-13
⋅
Google
⋅
Detecting and eliminating Chamois, a fraud botnet on Android Chamois |
2017-03-11
⋅
Marc Maiffret's Blog
⋅
Wikileaks Vault7 JQJSNICKER code leak JQJSNICKER |
2017-03-10
⋅
Malwarebytes
⋅
Explained: Spora ransomware Spora |
2017-03-10
⋅
Check Point
⋅
Preinstalled Malware Targeting Mobile Users Loki |