Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-10-01Check PointAliaksandr Trafimchuk, Stanislav Skuratovich
Digging for Groundhogs: Holes in your Linux server
XOR DDoS
2015-09-30ThisIsSecurityBenoît Ancel
When ELF.BillGates met Windows
BillGates
2015-09-29InfoSec InstituteAyoub Faouzi
Andromeda Bot Analysis part 1
Andromeda
2015-09-29InfoSec InstituteAyoub Faouzi
Andromeda Bot Analysis part 2
Andromeda
2015-09-28SecurityIntelligenceDavid Strom
Hammertoss: What, Me Worry?
tDiscoverer
2015-09-28Trend MicroTrend Micro Forward Looking Research Team
Two New PoS Malware Affecting US SMBs
Alina POS
2015-09-28Kaspersky LabsGhareeb Saad, Mohamad Amin Hasbini
Gaza cybergang, where’s your IR team?
Molerats
2015-09-25Blaze's Security BlogBartBlaze
Notes on Linux/Xor.DDoS
XOR DDoS
2015-09-24ProofpointThoufique Haq
Meet GreenDispenser: A New Breed of ATM Malware
GreenDispenser
2015-09-24Trend MicroMichael Marcos, RonJay Caragay
Credit Card-Scraping Kasidet Builder Leads to Spike in Detections
Neutrino
2015-09-24SymantecSymantec Security Response
Kovter malware learns from Poweliks with persistent fileless registry update
Kovter
2015-09-23Johannes Bader's BlogJohannes Bader
Ranbyus's DGA, Revisited
Ranbyus
2015-09-23SpiderLabs BlogRodel Mendrez
Quaverse RAT: Remote-Access-as-a-Service
QRat
2015-09-23Palo Alto Networks Unit 42Jen Miller-Osborn, Robert Falcone
Chinese Actors Use ‘3102’ Malware in Attacks on US Government and EU Media
9002 RAT
2015-09-23Palo Alto Networks Unit 42Jen Miller-Osborn, Robert Falcone
Chinese Actors Use ‘3102’ Malware in Attacks on US Government and EU Media
APT.3102
2015-09-18ProofpointProofpoint Staff
Operation Arid Viper Slithers Back into View
AridViper
2015-09-17F-SecureF-Secure Labs
The Dukes: 7 Years Of Russian Cyber-Espionage
APT29
2015-09-17Trend MicroTrendmicro
Operation Iron Tiger: Exploring Chinese Cyber-Espionage Attacks on United States Defense Contractors
APT27
2015-09-16Trend MicroChristopher Budd
Operation Iron Tiger: Attackers Shift from East Asia to the United States
APT27
2015-09-15ProofpointAleksey F, Thoufique Haq
In Pursuit of Optical Fibers and Troop Intel: Targeted Attack Distributes PlugX in Russia
PlugX