Click here to download all references as Bib-File.•
2016-09-23
⋅
Laanwj's Blog
⋅
SECONDDATE in action Equationgroup (Sorting) |
2016-09-22
⋅
ESET Research
⋅
Book of Eli: African targeted attacks Book of Eli |
2016-09-22
⋅
Forcepoint
⋅
Zeus Delivered by DELoader to Defraud Customers of Canadian Banks Zloader |
2016-09-21
⋅
KrebsOnSecurity Hit With Record DDoS Bashlite |
2016-09-21
⋅
Reversing GO binaries like a pro |
2016-09-20
⋅
Avast
⋅
Inside Petya and Mischa ransomware Petya |
2016-09-20
⋅
Deutsche Welle
⋅
Hackers lurking, parliamentarians told APT28 |
2016-09-20
⋅
Deutsche Welle
⋅
Hackers lurking, parliamentarians told |
2016-09-20
⋅
SecurityIntelligence
⋅
Meanwhile in Britain, Qadars v3 Hardens Evasion, Targets 18 UK Banks Qadars |
2016-09-19
⋅
Trend Micro
⋅
Untangling the Ripper ATM Malware Ripper ATM |
2016-09-17
⋅
A few notes on SECONDDATE's C&C protocol Equationgroup (Sorting) |
2016-09-16
⋅
CERT.PL
⋅
Tofsee – modular spambot Tofsee |
2016-09-16
⋅
Zscaler
⋅
iSpy Keylogger iSpy Keylogger |
2016-09-15
⋅
Palo Alto Networks Unit 42
⋅
MILE TEA: Cyber Espionage Campaign Targets Asia Pacific Businesses and Government Agencies Elirks Logedrut Micrass |
2016-09-14
⋅
Deloitte
⋅
The evolution of the Nymaim Criminal Enterprise Threat Intelligence & Analytics Nymaim |
2016-09-14
⋅
Trend Micro
⋅
BkSoD by Ransomware: HDDCryptor Uses Commercial Tools to Encrypt Network Shares and Lock HDDs Mamba |
2016-09-13
⋅
Cisco
⋅
H1N1: Technical analysis reveals new capabilities H1N1 Loader |
2016-09-13
⋅
The curious case of BLATSTING's RSA implementation Equationgroup (Sorting) |
2016-09-13
⋅
Palo Alto Networks Unit 42
⋅
DualToy: New Windows Trojan Sideloads Risky Apps to Android and iOS Devices DualToy |
2016-09-13
⋅
Palo Alto Networks Unit 42
⋅
DualToy: New Windows Trojan Sideloads Risky Apps to Android and iOS Devices DualToy DualToy |