Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2014-12-04Sergei Frankoff
Inside The New Asprox/Kuluoz (October 2013 - January 2014)
Asprox
2014-12-01FireEyeBarry Vengerik, Jonathan Wrolstad, Jordan Berry, Kristen Dennesen
FIN4: Stealing Insider Information for an Advantage in Stock Trading?
WOLF SPIDER
2014-12-01SecurityKitten BlogNick Hoffman
LusyPOS and Tor
2014-11-30FortinetFortiGuard
W32/HiAsm.A!tr
HiAsm
2014-11-27Trend MicroAnthony Joe Melgarejo
New PoS Malware Kicks off Holiday Shopping Weekend
GetMyPass
2014-11-26Nick Hoffman
Getmypass Point of Sale Malware
GetMyPass
2014-11-26CIRCLCIRCL
TR-23 Analysis - NetWiredRC malware
NetWire RC
2014-11-25Adventures in SecurityNick Hoffman
Curious Korlia
Korlia
2014-11-25Kaspersky LabsBrain Donohue
Regin APT Attacks Among the Most Sophisticated Ever Analyzed
Regin
2014-11-24KasperskyKaspersky Lab
The Regin Platform Nation-State Ownage Of GSM Networks
Regin
2014-11-24KasperskyGReAT
Regin: nation-state ownage of GSM networks
Regin
2014-11-24CrowdStrikeMatt Dahl
I am Ironman: DEEP PANDA Uses Sakula Malware to Target Organizations in Multiple Sectors
APT19
2014-11-21FireEyeJoshua Homan, Mike Oppenheim, Mike Scott, Ned Moran
Operation Double Tap
pirpi
2014-11-19Trend MicroJoie Salvio
ROVNIX Infects Systems with Password-Protected Macros
ReactorBot
2014-11-15Contagio DumpMila Parkour
OnionDuke samples
OnionDuke
2014-11-14SensepostEtienne Stalmans, Sam Hunter, Willem Mouton
reGeorg
reGeorg
2014-11-14F-SecureF-Secure Labs
OnionDuke: APT Attacks Via the Tor Network
OnionDuke
2014-11-13ZeroNightsAnton Cherepanov
Roaming tiger
Roaming Tiger
2014-11-13ABC NewsDylan Welch
Chinese hackers 'breach Australian media organisations' ahead of G20
APT19
2014-11-13ZeroNightsIvanov Boris
Computer Forensic Investigation of mobile Banking Trojan
FIN7