Click here to download all references as Bib-File.•
2014-12-04
⋅
Inside The New Asprox/Kuluoz (October 2013 - January 2014) Asprox |
2014-12-01
⋅
FireEye
⋅
FIN4: Stealing Insider Information for an Advantage in Stock Trading? WOLF SPIDER |
2014-12-01
⋅
SecurityKitten Blog
⋅
LusyPOS and Tor |
2014-11-30
⋅
Fortinet
⋅
W32/HiAsm.A!tr HiAsm |
2014-11-27
⋅
Trend Micro
⋅
New PoS Malware Kicks off Holiday Shopping Weekend GetMyPass |
2014-11-26
⋅
Getmypass Point of Sale Malware GetMyPass |
2014-11-26
⋅
CIRCL
⋅
TR-23 Analysis - NetWiredRC malware NetWire RC |
2014-11-25
⋅
Adventures in Security
⋅
Curious Korlia Korlia |
2014-11-25
⋅
Kaspersky Labs
⋅
Regin APT Attacks Among the Most Sophisticated Ever Analyzed Regin |
2014-11-24
⋅
Kaspersky
⋅
The Regin Platform Nation-State Ownage Of GSM Networks Regin |
2014-11-24
⋅
Kaspersky
⋅
Regin: nation-state ownage of GSM networks Regin |
2014-11-24
⋅
CrowdStrike
⋅
I am Ironman: DEEP PANDA Uses Sakula Malware to Target Organizations in Multiple Sectors APT19 |
2014-11-21
⋅
FireEye
⋅
Operation Double Tap pirpi |
2014-11-19
⋅
Trend Micro
⋅
ROVNIX Infects Systems with Password-Protected Macros ReactorBot |
2014-11-15
⋅
Contagio Dump
⋅
OnionDuke samples OnionDuke |
2014-11-14
⋅
Sensepost
⋅
reGeorg reGeorg |
2014-11-14
⋅
F-Secure
⋅
OnionDuke: APT Attacks Via the Tor Network OnionDuke |
2014-11-13
⋅
ZeroNights
⋅
Roaming tiger Roaming Tiger |
2014-11-13
⋅
ABC News
⋅
Chinese hackers 'breach Australian media organisations' ahead of G20 APT19 |
2014-11-13
⋅
ZeroNights
⋅
Computer Forensic Investigation of mobile Banking Trojan FIN7 |