Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-02-02Blaze's Security BlogBartBlaze
Vipasana ransomware new ransom on the block
Cryakl
2016-02-02Malwarebyteshasherezade
DMA Locker: New Ransomware, But No Reason To Panic
DMA Locker
2016-02-01Blue Coat Systems IncSnorre Fagerland
From Seoul to Sony The History of the Darkseoul Group and the Sony Intrusion Malware Destover
Joanap Sierra(Alfa,Bravo, ...)
2016-02-01NovettaNovetta
Operation Blockbuster
Lazarus Group
2016-02-01BluelivRaashid Bhat
Tracking the footprints of PushDo Trojan
Pushdo
2016-01-29Virus BulletinAndrei Nacu, Mihail Androinic, Vlad Craciun
VB2015 paper: It's A File Infector... It’s Ransomware... It's Virlock
VirLock
2016-01-29ZscalerNirmal Singh
Malicious Office Files Dropping Kasidet And Dridex
Neutrino
2016-01-29Kaspersky LabsStefan Ortloff
From Linux to Windows – New Family of Cross-Platform Desktop Backdoors Discovered
Mokes Mokes
2016-01-28Kaspersky LabsGReAT
BlackEnergy APT Attacks in Ukraine employ spearphishing with Word documents
BlackEnergy
2016-01-28FireEyeFireEye Threat Intelligence
CenterPOS: An Evolving POS Threat
CenterPOS
2016-01-28ProofpointDarien Huss
Exploring Bergard: Old Malware with New Tricks
virdetdoor APT19
2016-01-28VoidSecPaolo Stagno
Keybase
KeyBase
2016-01-27Fidelis CybersecurityThreat Research Team
Introducing Hi-Zor RAT
Hi-Zor RAT
2016-01-26FireEyeAyako Matsuda, Joonho Sa, Lennard Galang, Shinsuke Honjo, Sudeep Singh
URLZone Zones in on Japan
UrlZone
2016-01-25Bleeping ComputerLawrence Abrams
Hidden Tear Ransomware Developer Blackmailed by Malware Developers using his Code
EDA2 HiddenTear
2016-01-24Palo Alto Networks Unit 42Jen Miller-Osborn, Robert Falcone
Scarlet Mimic: Years-Long Espionage Campaign Targets Minority Activists
CrypticConvo Scarlet Mimic
2016-01-23Github (utkusen)Utku Sen
Github Repository of EDA2
EDA2
2016-01-23LinkCabinLinkCabin
Imminent Monitor 4 RAT Analysis – A Glance
Imminent Monitor RAT
2016-01-22FortiGuard LabsRuchna Nigam
CVE-2015-4400 : Backdoorbot, Network Configuration Leak on a Connected Doorbell
2016-01-22Department of JusticeDepartment of Justice
United States District Court Southern District New York vs. ITSEC Team
Cutting Kitten