Click here to download all references as Bib-File.•
2015-10-26
⋅
Symantec
⋅
Duuzer back door Trojan targets South Korea to take over computers Brambul Duuzer Joanap Lazarus Group |
2015-10-26
⋅
Blueliv
⋅
Chasing cybercrime: network insights of Dyre and Dridex Trojan bankers Dridex Dyre |
2015-10-26
⋅
Symantec
⋅
Duuzer back door Trojan targets South Korea to take over computers Lazarus Group |
2015-10-22
⋅
Trend Micro
⋅
Pawn Storm Targets MH17 Investigation Team APT28 |
2015-10-19
⋅
Github (Anderson-D)
⋅
Github Repository for AllaKore AllaKore |
2015-10-17
⋅
BSK Consulting
⋅
How to Write Simple but Sound Yara Rules – Part 2 Enfal |
2015-10-16
⋅
Palo Alto Networks Unit 42
⋅
Surveillance Malware Trends: Tracking Predator Pain and HawkEye HawkEye Keylogger |
2015-10-15
⋅
BitSight
⋅
Dridex: Chasing a botnet from the inside Dridex |
2015-10-15
⋅
Archivist Archivist |
2015-10-13
⋅
Kaspersky Labs
⋅
I am HDRoot! Part 2 HDRoot |
2015-10-13
⋅
DARKReading
⋅
Prolific Cybercrime Gang Favors Legit Login Credentials FIN5 |
2015-10-13
⋅
Secureworks
⋅
Dridex (Bugat v5) Botnet Takeover Operation Dridex Evil Corp |
2015-10-13
⋅
Trend Micro
⋅
New Adobe Flash Zero-Day Used in Pawn Storm Campaign Targeting Foreign Affairs Ministries APT28 |
2015-10-13
⋅
Trend Micro
⋅
New Adobe Flash Zero-Day Used in Pawn Storm Campaign Targeting Foreign Affairs Ministries Seduploader |
2015-10-12
⋅
th3l4b
⋅
Keybase Logger/Clipboard/CredsStealer campaign KeyBase |
2015-10-09
⋅
InfoSec Institute
⋅
Beta Bot Analysis: Part 1 |
2015-10-09
⋅
Palo Alto Networks Unit 42
⋅
Latest TeslaCrypt Ransomware Borrows Code From Carberp Trojan TeslaCrypt |
2015-10-08
⋅
Proofpoint
⋅
Dyre Malware Campaigners Innovate with Distribution Techniques Gophe |
2015-10-08
⋅
Virus Bulletin
⋅
Catching the silent whisper: Understanding the Derusbi family tree Derusbi |
2015-10-08
⋅
enSilo
⋅
MOKER, PART 2: CAPABILITIES Moker |