Click here to download all references as Bib-File.•
2015-12-01
⋅
Trend Micro
⋅
Operation Black Atlas Endangers In-Store Card Payments and SMBs Worldwide; Switches between BlackPOS and Other Tools Alina POS BlackPOS Kronos NewPosThings |
2015-12-01
⋅
CERT.PL
⋅
ZeuS-P2P monitoring and analysis Gameover P2P |
2015-12-01
⋅
FireEye
⋅
China-based Cyber Threat Group Uses Dropbox for Malware Communications and Targets Hong Kong Media Outlets BUBBLEWRAP LOWBALL TEMPER PANDA |
2015-11-30
⋅
0x3A Security
⋅
Inside Braviax/FakeRean: An analysis and history of a FakeAV family |
2015-11-27
⋅
Twitter (@PhysicalDrive0)
⋅
Tweet on ModPOS ModPOS |
2015-11-25
⋅
RSA
⋅
Detecting GlassRAT using Security Analytics and ECAT GlassRAT |
2015-11-24
⋅
FireEye
⋅
ModPOS: Highly-Sophisticated, Stealthy Malware Targeting US POS Systems with High Likelihood of Broader Campaigns ModPOS |
2015-11-23
⋅
MinervaLabs
⋅
CopyKittens Attack Group CopyKittens |
2015-11-20
⋅
A king's ransom: an analysis of the CTB-locker ransomware CTB Locker |
2015-11-20
⋅
Microsoft
⋅
Microsoft Security Intelligence Report Volume 19 XTunnel |
2015-11-19
⋅
JPCERT/CC
⋅
Decrypting Strings in Emdivi Emdivi |
2015-11-17
⋅
SpiderLabs Blog
⋅
New Memory Scraping Technique in Cherry Picker PoS Malware CherryPicker POS |
2015-11-16
⋅
Introducing LogPOS LogPOS |
2015-11-16
⋅
SpiderLabs Blog
⋅
Shining the Spotlight on Cherry Picker PoS Malware CherryPicker POS |
2015-11-11
⋅
ESET Research
⋅
Operation Buhtrap malware distributed via ammyy.com BuhTrap |
2015-11-11
⋅
Proofpoint
⋅
AbaddonPOS: A new point of sale threat linked to Vawtrak AbaddonPOS TinyLoader |
2015-11-10
⋅
Palo Alto Networks Unit 42
⋅
Bookworm Trojan: A Model of Modular Architecture Bookworm |
2015-11-10
⋅
CERT.PL
⋅
Talking to Dridex (part 0) – inside the dropper Dridex |
2015-11-06
⋅
SecurityIntelligence
⋅
OmniRAT Takes Over Android Devices Through Social Engineering Tricks OmniRAT |
2015-11-05
⋅
Kudelski Security
⋅
Sphinx Moth: Expanding our knowledge of the “Wild Neutron” / “Morpho” APT WildNeutron |