Click here to download all references as Bib-File.•
2016-12-14
⋅
Adventures in Security
⋅
MiKey - A Linux keylogger MiKey |
2016-12-14
⋅
Microsoft
⋅
Twin zero-day attacks: PROMETHIUM and NEODYMIUM target individuals in Europe PROMETHIUM |
2016-12-14
⋅
Microsoft
⋅
Twin zero-day attacks: PROMETHIUM and NEODYMIUM target individuals in Europe NEODYMIUM |
2016-12-13
⋅
ESET Research
⋅
The rise of TeleBots: Analyzing disruptive KillDisk attacks KillDisk TeleBot Sandworm |
2016-12-13
⋅
ESET Research
⋅
The rise of TeleBots: Analyzing disruptive KillDisk attacks Credraptor KillDisk TeleBot |
2016-12-12
⋅
SC Magazine
⋅
Inside DiamondFox DiamondFox |
2016-12-09
⋅
360netlab
⋅
Now Mirai Has DGA Feature Built in Mirai |
2016-12-09
⋅
Bleeping Computer
⋅
New Exo Android Trojan Sold on Hacking Forums, Dark Web ExoBot |
2016-12-09
⋅
Microsoft
⋅
Windows 10: protection, detection, and response against recent Depriz malware attacks TERBIUM |
2016-12-09
⋅
Bleeping Computer
⋅
"Proof of Concept" CryptoWire Ransomware Spawns Lomix and UltraLocker Families CryptoWire |
2016-12-08
⋅
Deutsche Welle
⋅
Thyssenkrupp victim of cyber attack APT41 |
2016-12-07
⋅
Cisco Talos
⋅
Floki Bot Strikes, Talos and Flashpoint Respond FlokiBot |
2016-12-07
⋅
Botconf
⋅
The TrickBot Evolution TrickBot |
2016-12-07
⋅
Proofpoint
⋅
August in November: New Information Stealer Hits the Scene TA530 |
2016-12-06
⋅
Fortinet
⋅
Deep Analysis of the Online Banking Botnet TrickBot TrickBot |
2016-12-06
⋅
Proofpoint
⋅
August in November: New Information Stealer Hits the Scene August Stealer |
2016-12-03
⋅
Coding and Security
⋅
"Sophisticated" and "Genius" Shamoon 2.0 Malware Analysis DistTrack |
2016-12-01
⋅
US-CERT
⋅
Alert (TA16-336A): Avalanche (crimeware-as-a-service infrastructure) GootKit |
2016-12-01
⋅
Zscaler
⋅
CNACOM - Open Source Exploitation via Strategic Web Compromise |
2016-11-30
⋅
Symantec
⋅
Shamoon: Back from the dead and destructive as ever DistTrack OilRig |