Click here to download all references as Bib-File.•
2015-03-30
⋅
Check Point
⋅
Volatile Cedar Volatile Cedar |
2015-03-30
⋅
Symantec
⋅
New reconnaissance threat Trojan.Laziok targets the energy sector Laziok |
2015-03-30
⋅
Trend Micro
⋅
Fake Judicial Spam Leads to Backdoor with Fake Certificate Authority GootKit |
2015-03-28
⋅
Github (hfiref0x)
⋅
UACME UACMe |
2015-03-24
⋅
Trend Micro
⋅
Operation Woolen-Goldfish: When Kittens Go Phishing Ghole Woolger |
2015-03-20
⋅
Cisco Talos
⋅
Threat Spotlight: PoSeidon, A Deep Dive Into Point of Sale Malware FindPOS |
2015-03-19
⋅
Trend Micro
⋅
Operation WOOLEN-GOLDFISH: When Kittens Go Phishing Ghole Woolger |
2015-03-19
⋅
Analyzing a Backdoor/Bot forthe MIPS Platform TheMoon |
2015-03-19
⋅
Trend Micro
⋅
Rocket Kitten Showing Its Claws: Operation Woolen-GoldFish and the GHOLE campaign Cleaver Rocket Kitten |
2015-03-19
⋅
Palo Alto Networks Unit 42
⋅
FindPOS: New POS Malware Family Discovered FindPOS |
2015-03-18
⋅
Seattle Times
⋅
Feds warned Premera about security flaws before breach APT19 |
2015-03-11
⋅
Kaspersky Labs
⋅
Inside the EquationDrug Espionage Platform EquationDrug |
2015-03-11
⋅
Zscaler
⋅
Malvertising Targeting European Transit Users Poweliks |
2015-03-10
⋅
Johannes Bader Blog
⋅
The DGA of Pykspa Pykspa |
2015-03-09
⋅
ESET Research
⋅
CryptoFortress mimics TorrentLocker but is a different ransomware CryptoFortress |
2015-03-07
⋅
CERT.PL
⋅
Slave, Banatrix and ransomware Slave |
2015-03-06
⋅
Kaspersky Labs
⋅
Animals in the APT Farm SNOWGLOBE |
2015-03-06
⋅
The DGA of DirCrypt DirCrypt |
2015-03-05
⋅
ESET Research
⋅
Casper Malware: After Babar and Bunny, Another Espionage Cartoon Casper |
2015-03-04
⋅
Twitter (@PhysicalDrive0)
⋅
Tweet on POS Malware pwnpos |