Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-11-04Antiy CERTAntiy CERT
FROM EQUATION TO EQUATIONS
DoubleFantasy
2016-11-02Ariel Koren's BlogAriel Koren
Nymaim Malware: Deep Technical Dive – Adventures in Evasive Malware
Nymaim
2016-11-02GoSecureMasarah Paquet-Clouston
Exposing the EGO MARKET: the cybercrime performed by the Linux/Moose botnet
Moose
2016-11-02ESET ResearchESET Research
Linux/Moose: Still breathing
Moose
2016-11-01Ariel Koren's BlogAriel Koren
Ursnif Malware: Deep Technical Dive
ISFB
2016-10-31SC Magazine UKRoi Perez
Second Shadow Brokers dump released
The Shadow Brokers
2016-10-28Github (smb01)smb01
zxshell repository
ZXShell
2016-10-27SekoiaPaul Rascagnères
Rootkit analysisUse case on HideDRV
HideDRV
2016-10-27Simon Roses Femerling BlogSimon Roses
Mirai DDoS Botnet: Source Code & Binary Analysis
Mirai
2016-10-27Kaspersky LabsAlexey Shulmin, Sergey Yunakovsky
Inside the Gootkit C&C server
GootKit
2016-10-27Bleeping ComputerLawrence Abrams
In-Dev Ransomware forces you do to Survey before unlocking Computer
FileIce
2016-10-27Trend MicroJoey Chen, MingYen Hsieh
BLACKGEAR Espionage Campaign Evolves, Adds Japan To Target List
Blackgear
2016-10-27Twitter (@struppigel)Karsten Hahn
Tweet on procleaner.exe
ScreenLocker
2016-10-26UnknownChris Doman
Moonlight – Targeted attacks in the Middle East
Houdini NjRAT Molerats
2016-10-25NetScoutASERT Team
TrickBot Banker Insights
Godzilla Loader TrickBot
2016-10-25Palo Alto Networks Unit 42Anthony Kasza
Houdini’s Magic Reappearance
2016-10-25Palo Alto Networks Unit 42Anthony Kasza
Houdini’s Magic Reappearance
Houdini
2016-10-24Lastlinelastline Labs Team
Evasive Malware Detects and Defeats Virtual Machine Analysis
2016-10-24MalwarebytesMalwarebytes Labs
Introducing TrickBot, Dyreza’s successor
TrickBot
2016-10-21ForcepointRolanda Dela Paz
BITTER: a targeted attack against Pakistan
Bitter RAT