Click here to download all references as Bib-File.•
| 2018-05-09
⋅
COUNT UPON SECURITY
⋅
Malware Analysis - PlugX - Part 2 PlugX |
| 2018-05-09
⋅
F5
⋅
Panda Malware Broadens Targets to Cryptocurrency Exchanges and Social Media |
| 2018-05-09
⋅
Cisco Talos
⋅
Gandcrab Ransomware Walks its Way onto Compromised Sites Gandcrab |
| 2018-05-08
⋅
Security 0wnage
⋅
Clearing the MuddyWater - Analysis of new MuddyWater Samples POWERSTATS |
| 2018-05-08
⋅
AP News
⋅
Russian hackers posed as IS to threaten military wives APT28 |
| 2018-05-08
⋅
Bleeping Computer
⋅
"Hide and Seek" Becomes First IoT Botnet Capable of Surviving Device Reboots Hide and Seek |
| 2018-05-07
⋅
Bitdefender
⋅
Hide and Seek IoT Botnet resurfaces with new tricks, persistence Hide and Seek |
| 2018-05-07
⋅
Kaspersky Labs
⋅
SynAck targeted ransomware uses the Doppelgänging technique SynAck |
| 2018-05-07
⋅
European Association for Secure Transactions
⋅
EAST Publishes European Fraud Update 2-2018 WinPot |
| 2018-05-04
⋅
Avast
⋅
Botception with Necurs: Botnet distributes script with bot capabilities Necurs |
| 2018-05-03
⋅
Kaspersky Labs
⋅
Who’s who in the Zoo ZooPark ZooPark |
| 2018-05-03
⋅
McAfee
⋅
Dissecting Operation Troy: Cyberespionage in South Korea concealment_troy http_troy Lazarus Group |
| 2018-05-03
⋅
Kaspersky Labs
⋅
WHO’S WHO IN THEZOO. CYBERESPIONAGE OPERATION TARGETS ANDROID USERS IN THE MIDDLE EAST. ZooPark |
| 2018-05-03
⋅
Kaspersky Labs
⋅
Who’s who in the Zoo ZooPark |
| 2018-05-03
⋅
Twitter (@thor_scanner)
⋅
Empire Downloader Empire Downloader |
| 2018-05-03
⋅
ProtectWise
⋅
Burning Umbrella: An Intelligence Report on the Winnti Umbrella and Associated State-Sponsored Attackers APT41 |
| 2018-05-01
⋅
FireEye
⋅
M-Trends May 2018: From the field Operation C-Major |
| 2018-05-01
⋅
NetScout
⋅
Lojack Becomes a Double-Agent Computrace |
| 2018-05-01
⋅
Trend Micro
⋅
Legitimate Application AnyDesk Bundled with New Ransomware Variant BlackRouter |
| 2018-05-01
⋅
Sophos
⋅
VPNFilter Botnet - a SophosLabs Analysis VPNFilter |