Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-03-10ProofpointProofpoint Staff
Death Comes Calling: Thanatos/Alphabot Trojan Hits the Market
Thanatos
2016-03-09SOFTPEDIA® NEWSCatalin Cimpanu
Korean Energy and Transportation Targets Attacked by OnionDog APT
OnionDog
2016-03-08FireEyeFireEye
SOUTHEAST ASIA: AN EVOLVING CYBER THREAT LANDSCAPE
APT5
2016-03-07Github (xl7dev)xl7dev
RedHat Hacker.asp
RedHat Hacker WebShell
2016-03-06Github (TKCERT)thyssenkrupp CERT
Network detector for Winnti malware
Winnti
2016-03-06Palo Alto Networks Unit 42Claud Xiao
New OS X Ransomware KeRanger Infected Transmission BitTorrent Client Installer
KeRanger
2016-03-06Johannes Bader
The DGA of PadCrypt
PadCrypt
2016-03-04SANSDavid Martin
Tracing the Lineage of DarkSeoul
httpdropper
2016-03-03Kaspersky LabsMikhail Kuzin, Nikita Buchka
Attack on Zygote: a new twist in the evolution of mobile threats
Triada
2016-03-02RSA ConferenceVanja Svajcer
Dissecting Derusbi
Derusbi
2016-03-01Trend MicroRazor Huang
Shrouded Crossbow Creators Behind BIFROSE for UNIX
KIVARS
2016-03-01Group-IBGroup-IB
BUHTRAP: The Evolution of Targetted Attacks Against Financial Instituitions
BuhTrap
2016-03-01PWCMichael Yip
Taiwan Presidential Election: A Case Study on Thematic Targeting
SunOrcal
2016-03-01Trend MicroDavid Sancho, Feike Hacquebord
Operation C-Major: Information Theft Campaign Targets Military Personnel in India
Operation C-Major
2016-03-01Malwarebyteshasherezade
Look Into Locky Ransomware
Locky
2016-03-01ProofpointDarien Huss
Operation Transparent Tribe
Andromeda beendoor Bezigate Crimson RAT Luminosity RAT Operation C-Major
2016-02-29Palo Alto Networks Unit 42Kaoru Hayashi, Vicky Ray
New Malware ‘Rover’ Targets Indian Ambassador to Afghanistan
Rover
2016-02-29SophosPaul Ducklin
The “HawkEye” attack: how cybercrooks target small businesses for big money
HawkEye Keylogger
2016-02-26ProofpointProofpoint Staff
Nymaim Moves Past Its Ransomware Roots - What Is Old Is New Again
Nymaim
2016-02-25Palo Alto Networks Unit 42Jeff White
KeyBase Threat Grows Despite Public Takedown: A Picture is Worth a Thousand Words
KeyBase