Click here to download all references as Bib-File.•
2016-03-10
⋅
Proofpoint
⋅
Death Comes Calling: Thanatos/Alphabot Trojan Hits the Market Thanatos |
2016-03-09
⋅
SOFTPEDIA® NEWS
⋅
Korean Energy and Transportation Targets Attacked by OnionDog APT OnionDog |
2016-03-08
⋅
FireEye
⋅
SOUTHEAST ASIA: AN EVOLVING CYBER THREAT LANDSCAPE APT5 |
2016-03-07
⋅
Github (xl7dev)
⋅
RedHat Hacker.asp RedHat Hacker WebShell |
2016-03-06
⋅
Github (TKCERT)
⋅
Network detector for Winnti malware Winnti |
2016-03-06
⋅
Palo Alto Networks Unit 42
⋅
New OS X Ransomware KeRanger Infected Transmission BitTorrent Client Installer KeRanger |
2016-03-06
⋅
The DGA of PadCrypt PadCrypt |
2016-03-04
⋅
SANS
⋅
Tracing the Lineage of DarkSeoul httpdropper |
2016-03-03
⋅
Kaspersky Labs
⋅
Attack on Zygote: a new twist in the evolution of mobile threats Triada |
2016-03-02
⋅
RSA Conference
⋅
Dissecting Derusbi Derusbi |
2016-03-01
⋅
Trend Micro
⋅
Shrouded Crossbow Creators Behind BIFROSE for UNIX KIVARS |
2016-03-01
⋅
Group-IB
⋅
BUHTRAP: The Evolution of Targetted Attacks Against Financial Instituitions BuhTrap |
2016-03-01
⋅
PWC
⋅
Taiwan Presidential Election: A Case Study on Thematic Targeting SunOrcal |
2016-03-01
⋅
Trend Micro
⋅
Operation C-Major: Information Theft Campaign Targets Military Personnel in India Operation C-Major |
2016-03-01
⋅
Malwarebytes
⋅
Look Into Locky Ransomware Locky |
2016-03-01
⋅
Proofpoint
⋅
Operation Transparent Tribe Andromeda beendoor Bezigate Crimson RAT Luminosity RAT Operation C-Major |
2016-02-29
⋅
Palo Alto Networks Unit 42
⋅
New Malware ‘Rover’ Targets Indian Ambassador to Afghanistan Rover |
2016-02-29
⋅
Sophos
⋅
The “HawkEye” attack: how cybercrooks target small businesses for big money HawkEye Keylogger |
2016-02-26
⋅
Proofpoint
⋅
Nymaim Moves Past Its Ransomware Roots - What Is Old Is New Again Nymaim |
2016-02-25
⋅
Palo Alto Networks Unit 42
⋅
KeyBase Threat Grows Despite Public Takedown: A Picture is Worth a Thousand Words KeyBase |