Click here to download all references as Bib-File.•
2015-10-01
⋅
Check Point
⋅
Digging for Groundhogs: Holes in your Linux server XOR DDoS |
2015-09-30
⋅
ThisIsSecurity
⋅
When ELF.BillGates met Windows BillGates |
2015-09-29
⋅
InfoSec Institute
⋅
Andromeda Bot Analysis part 1 Andromeda |
2015-09-29
⋅
InfoSec Institute
⋅
Andromeda Bot Analysis part 2 Andromeda |
2015-09-28
⋅
SecurityIntelligence
⋅
Hammertoss: What, Me Worry? tDiscoverer |
2015-09-28
⋅
Trend Micro
⋅
Two New PoS Malware Affecting US SMBs Alina POS |
2015-09-28
⋅
Kaspersky Labs
⋅
Gaza cybergang, where’s your IR team? Molerats |
2015-09-25
⋅
Blaze's Security Blog
⋅
Notes on Linux/Xor.DDoS XOR DDoS |
2015-09-24
⋅
Proofpoint
⋅
Meet GreenDispenser: A New Breed of ATM Malware GreenDispenser |
2015-09-24
⋅
Trend Micro
⋅
Credit Card-Scraping Kasidet Builder Leads to Spike in Detections Neutrino |
2015-09-24
⋅
Symantec
⋅
Kovter malware learns from Poweliks with persistent fileless registry update Kovter |
2015-09-23
⋅
Johannes Bader's Blog
⋅
Ranbyus's DGA, Revisited Ranbyus |
2015-09-23
⋅
SpiderLabs Blog
⋅
Quaverse RAT: Remote-Access-as-a-Service QRat |
2015-09-23
⋅
Palo Alto Networks Unit 42
⋅
Chinese Actors Use ‘3102’ Malware in Attacks on US Government and EU Media 9002 RAT |
2015-09-23
⋅
Palo Alto Networks Unit 42
⋅
Chinese Actors Use ‘3102’ Malware in Attacks on US Government and EU Media APT.3102 |
2015-09-18
⋅
Proofpoint
⋅
Operation Arid Viper Slithers Back into View AridViper |
2015-09-17
⋅
F-Secure
⋅
The Dukes: 7 Years Of Russian Cyber-Espionage APT29 |
2015-09-17
⋅
Trend Micro
⋅
Operation Iron Tiger: Exploring Chinese Cyber-Espionage Attacks on United States Defense Contractors APT27 |
2015-09-16
⋅
Trend Micro
⋅
Operation Iron Tiger: Attackers Shift from East Asia to the United States APT27 |
2015-09-15
⋅
Proofpoint
⋅
In Pursuit of Optical Fibers and Troop Intel: Targeted Attack Distributes PlugX in Russia PlugX |