Click here to download all references as Bib-File.•
2012-11-29
⋅
Malware Don't Need Coffee
⋅
Inside view of Lyposit aka (for its friends) Lucky LOCKER Lyposit |
2012-11-28
⋅
SecurityIntelligence
⋅
Shylock’s New Trick: Evading Malware Researchers Shylock |
2012-11-27
⋅
Sophos
⋅
Threat Description: Troj/Ployx-A ployx |
2012-11-25
⋅
Cryptome
⋅
Parastoo Hacks IAEA Charming Kitten |
2012-11-22
⋅
Symantec
⋅
W32.Narilam – Business Database Sabotage Narilam |
2012-11-16
⋅
Symantec
⋅
Malware Targeting Windows 8 Uses Google Docs Makadocs |
2012-11-16
⋅
Github (DesignativeDave)
⋅
Remote Administration Tool for Android devices AndroRAT |
2012-11-16
⋅
Information on Security Blog
⋅
China Chopper Webshell - the 4KB that Owns your Web Server |
2012-11-14
⋅
Contagiodump Blog
⋅
Group Photos.zip OSX/Revir | OSX/iMuler samples March 2012-November 2012 iMuler |
2012-11-13
⋅
Sophos
⋅
New variant of Mac Trojan discovered, targeting Tibet iMuler |
2012-11-05
⋅
Malwarebytes
⋅
Citadel: a cyber-criminal’s ultimate weapon? Citadel |
2012-11-01
⋅
Virus Bulletin
⋅
Tracking the 2012 Sasfis campaign Asprox Sasfis |
2012-10-30
⋅
Trend Micro
⋅
JACKSBOT Has Some Dirty Tricks up Its Sleeves jRAT |
2012-10-23
⋅
Trend Micro
⋅
Detecting APT Activity with Network Traffic Analysis Enfal Gh0stnet Nitro sykipot taidoor |
2012-10-16
⋅
Trend Micro
⋅
The DORKBOT Rises NgrBot |
2012-10-13
⋅
Trend Micro
⋅
WORM_EMUDBOT.JP Emudbot |
2012-10-12
⋅
The Mac Security Blog
⋅
New Multiplatform Backdoor Jacksbot Discovered jRAT |
2012-10-09
⋅
Trend Micro
⋅
SASFIS Sasfis |
2012-10-09
⋅
Trend Micro
⋅
BKDR_SARHUST.A Sarhust |
2012-10-05
⋅
Malwarebytes
⋅
Dark Comet 2: Electric Boogaloo DarkComet |