Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-07-06NJCCICNJCCIC
7ev3n
7ev3n
2016-07-06ESET ResearchMarc-Etienne M.Léveillé
New OSX/Keydnap malware is hungry for credentials
Keydnap
2016-07-05BitdefenderAlexandra Gheorghe
New Backdoor Allows Full Access to Mac Systems, Bitdefender Warns
Eleanor
2016-07-03Contagio DumpMila Parkour, Tim Strazzere
Android Triada modular trojan
Triada
2016-07-01Virus BulletinGabor Szappanos
New Keylogger on the Block
KeyBase
2016-07-01Check PointCheck Point
From HummingBad to Worse
HummingBad
2016-07-01SpiderLabs BlogRodel Mendrez
How I Cracked a Keylogger and Ended Up in Someone's Inbox
HawkEye Keylogger
2016-06-30BitdefenderBitdefender
Pacifier APT
2016-06-30BitdefenderBitdefender
Pacifier APT
Skipper
2016-06-30BitdefenderBitdefender
Pacifier APT
Gazer Turla
2016-06-30JPCERT/CCShusei Tomonaga
Asruex: Malware Infecting through Shortcut Files
DarkHotel
2016-06-29EmsisoftSarah
Apocalypse: Ransomware which targets companies through insecure RDP
Apocalypse
2016-06-28Palo Alto Networks Unit 42Lior Efraim, Simon Conant, Tomer Bar
Prince of Persia – Game Over
Infy Infy
2016-06-25Malwarebyteshasherezade
Rokku Ransomware shows possible link with Chimera
Rokku
2016-06-25NSHCNSHC Threatrecon Team
SectorC08: Multi-Layered SFX in Recent Campaigns Target Ukraine
Pteranodon
2016-06-24Github (tennc)tennc
Ani-Shell
Ani-Shell
2016-06-23Palo Alto Networks Unit 42Kaoru Hayashi
Tracking Elirks Variants in Japan: Similarities to Previous Attacks
Elirks
2016-06-23Panda SecurityPanda Security
POS and Credit Cards: In the Line of Fire with “PunkeyPOS”
Punkey POS
2016-06-22Trend MicroJoseph C Chen
After Angler: Shift in Exploit Kit Landscape and New Crypto-Ransomware Activity
GooPic Drooper
2016-06-21FortinetFloser Bacurio, Roland Dela Paz
The Curious Case of an Unknown Trojan Targeting German-Speaking Users
Zloader