Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-03-14Kaspersky LabsAnton Ivanov, Fedor Sinitsyn
PetrWrap: the new Petya-based ransomware used in targeted attacks
PetrWrap
2017-03-14ClearSkyClearSky Research Team
Operation Electric Powder – Who is targeting Israel Electric Company?
ElectricPowder
2017-03-13MorphisecRoy Moshailov
Moving Target Defense Blog
Andromeda
2017-03-13Manuel K.-B.
Zeus Panda Webinjects: Don’t trust your eyes
PandaBanker
2017-03-13Core SecurityCore Security
Behind a Malware Lifecycle and Infection Chain: Linking Asprox, Zemot, Rovix and Rerdom Malware Families
Rerdom
2017-03-13GoogleBernhard Grill, Megan Ruthven, Xin Zhao
Detecting and eliminating Chamois, a fraud botnet on Android
Chamois
2017-03-11Marc Maiffret's BlogMarc Maiffret
Wikileaks Vault7 JQJSNICKER code leak
JQJSNICKER
2017-03-10MalwarebytesMalwarebytes Labs
Explained: Spora ransomware
Spora
2017-03-10Check PointCheck Point
Preinstalled Malware Targeting Mobile Users
Loki
2017-03-09TenableKevin Douglas
Spora Ransomware: Understanding the HTA Infection Vector
Spora
2017-03-08CylanceThreat Research Team
RawPOS Malware Rides Again
RawPOS
2017-03-07Kaspersky LabsGReAT
FROM SHAMOON TO STONEDRILL: Wipers attacking Saudi organizations and beyond
StoneDrill
2017-03-07Kaspersky LabsKaspersky
From Shamoon to Stonedrill
Charming Kitten
2017-03-07WikileaksWikileaks
Vault 7: CIA Hacking Tools Revealed
Unidentified 020 (Vault7)
2017-03-07WikileaksWikileaks
Vault 7: CIA Hacking Tools Revealed
[Vault 7/8]
2017-03-07FireEyeBarry Vengerik, Jordan Nuce, Steve Miller
FIN7 Spear Phishing Campaign Targets Personnel Involved in SEC Filings
POWERSOURCE FIN7
2017-03-06bashis
0-Day: Dahua backdoor Generation 2 and 3
BrickerBot
2017-03-02CiscoColin Grady, Edmund Brumaghin
Covert Channels and Poor Decisions: The Tale of DNSMessenger
DNSMessenger
2017-03-02Laboratory of Cryptography and System SecurityBoldizsar Bencsath
Update on the Fancy Bear Android malware (poprd30.apk)
X-Agent
2017-03-01KrebsOnSecurityBrian Krebs
Ransomware for Dummies: Anyone Can Do It
Philadephia Ransom