Click here to download all references as Bib-File.•
2017-03-14
⋅
Kaspersky Labs
⋅
PetrWrap: the new Petya-based ransomware used in targeted attacks PetrWrap |
2017-03-14
⋅
ClearSky
⋅
Operation Electric Powder – Who is targeting Israel Electric Company? ElectricPowder |
2017-03-13
⋅
Morphisec
⋅
Moving Target Defense Blog Andromeda |
2017-03-13
⋅
Zeus Panda Webinjects: Don’t trust your eyes PandaBanker |
2017-03-13
⋅
Core Security
⋅
Behind a Malware Lifecycle and Infection Chain: Linking Asprox, Zemot, Rovix and Rerdom Malware Families Rerdom |
2017-03-13
⋅
Google
⋅
Detecting and eliminating Chamois, a fraud botnet on Android Chamois |
2017-03-11
⋅
Marc Maiffret's Blog
⋅
Wikileaks Vault7 JQJSNICKER code leak JQJSNICKER |
2017-03-10
⋅
Malwarebytes
⋅
Explained: Spora ransomware Spora |
2017-03-10
⋅
Check Point
⋅
Preinstalled Malware Targeting Mobile Users Loki |
2017-03-09
⋅
Tenable
⋅
Spora Ransomware: Understanding the HTA Infection Vector Spora |
2017-03-08
⋅
Cylance
⋅
RawPOS Malware Rides Again RawPOS |
2017-03-07
⋅
Kaspersky Labs
⋅
FROM SHAMOON TO STONEDRILL: Wipers attacking Saudi organizations and beyond StoneDrill |
2017-03-07
⋅
Kaspersky Labs
⋅
From Shamoon to Stonedrill Charming Kitten |
2017-03-07
⋅
Wikileaks
⋅
Vault 7: CIA Hacking Tools Revealed Unidentified 020 (Vault7) |
2017-03-07
⋅
Wikileaks
⋅
Vault 7: CIA Hacking Tools Revealed [Vault 7/8] |
2017-03-07
⋅
FireEye
⋅
FIN7 Spear Phishing Campaign Targets Personnel Involved in SEC Filings POWERSOURCE FIN7 |
2017-03-06
⋅
0-Day: Dahua backdoor Generation 2 and 3 BrickerBot |
2017-03-02
⋅
Cisco
⋅
Covert Channels and Poor Decisions: The Tale of DNSMessenger DNSMessenger |
2017-03-02
⋅
Laboratory of Cryptography and System Security
⋅
Update on the Fancy Bear Android malware (poprd30.apk) X-Agent |
2017-03-01
⋅
KrebsOnSecurity
⋅
Ransomware for Dummies: Anyone Can Do It Philadephia Ransom |