Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-02-05IDFIDF
Hamas Uses Fake Facebook Profiles to Target Israeli Soldiers
GlanceLove
2017-02-04de VolkskrantHuib Modderkolk
Russen faalden bij hackpogingen ambtenaren op Nederlandse ministeries
APT28
2017-02-03Manuel K.-B.
Zeus Panda Webinjects: a case study
PandaBanker
2017-02-02Trend MicroTrend Micro
Ransomware Recap: January 14 - 29, 2017
Charger VirLock
2017-02-02Kaspersky LabsBrian Bartholomew
KopiLuwak: A New JavaScript Payload from Turla
KopiLuwak
2017-02-02ProofpointAxel F, Darien Huss, Pierre T, Proofpoint Staff
Oops, they did it again: APT Targets Russia and Belarus with ZeroT and PlugX
ZeroT
2017-02-01ESET ResearchJean-Ian Boutin, Matthieu Faou
Read The Manual: A Guide to the RTM Banking Trojan
RTM RTM
2017-01-31SANS ISC InfoSec ForumsJohannes
Malicious Office files using fileless UAC bypass to drop KEYBASE malware
KeyBase
2017-01-31MalwarebytesMalwarebytes Labs
Locky Bart ransomware and backend server analysis
Locky
2017-01-30CERT.PLJarosław Jedynak
Nymaim revisited
Nymaim
2017-01-30Palo Alto Networks Unit 42Mashav Sapir, Netanel Rimer, Simon Conant, Taras Malivanchuk, Tomer Bar, Yaron Samuel
Downeks and Quasar RAT Used in Recent Targeted Attacks Against Governments
Downeks
2017-01-30Palo Alto Networks Unit 42Mashav Sapir, Netanel Rimer, Simon Conant, Taras Malivanchuk, Tomer Bar, Yaron Samuel
Downeks and Quasar RAT Used in Recent Targeted Attacks Against Governments
Quasar RAT
2017-01-30GovCERT.chGovCERT.ch
Sage 2.0 comes with IP Generation Algorithm (IPGA)
SAGE
2017-01-30CiscoMariano Graziano, Paul Rascagnères
EyePyramid: An Archaeological Journey
Eye Pyramid
2017-01-28CyberXCyberX
Radiation Report
Tsunami
2017-01-27Joe's SecurityJoe
Deep Analysis of Android Ransom Charger
Charger
2017-01-26FortinetKai Lu
Deep Analysis of Android Rootnik Malware Using Advanced Anti-Debug and Anti-Hook, Part I: Debugging in The Scope of Native Layer
Rootnik
2017-01-26FlashpointFlashpoint
Dridex Banking Trojan Returns, Leverages New UAC Bypass Method
Dridex
2017-01-26FortinetKai Lu
Deep Analysis of Android Rootnik Malware Using Advanced Anti-Debug and Anti-Hook, Part II: Analysis of The Scope of Java
Rootnik
2017-01-26SecurityIntelligenceLimor Kessem
Around the World With Zeus Sphinx: From Canada to Australia and Back
Zloader