Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2012-12-06Contagiodump BlogMila Parkour
Nov 2012 - W32.Narilam Sample
Narilam
2012-12-05Contagiodump BlogMila Parkour
OSX/Dockster.A and Win32/Trojan.Agent.AXMO Samples, pcaps, OSX malware analysis tools
Dockster
2012-12-03F-SecureSean
New Mac Malware Found on Dalai Lama Related Website
Dockster
2012-12-03Virus BulletinRaul Alvarez
Compromised library
Floxif
2012-11-29Trend MicroTrend Micro
What’s the Fuss with WORM_VOBFUS?
Vobfus
2012-11-29Malware Don't Need CoffeeKafeine
Inside view of Lyposit aka (for its friends) Lucky LOCKER
Lyposit
2012-11-28SecurityIntelligenceDana Tamir
Shylock’s New Trick: Evading Malware Researchers
Shylock
2012-11-27SophosSophos
Threat Description: Troj/Ployx-A
ployx
2012-11-25CryptomeCryptome
Parastoo Hacks IAEA
Charming Kitten
2012-11-22SymantecSecurity Response
W32.Narilam – Business Database Sabotage
Narilam
2012-11-16SymantecTakashi Katsuki
Malware Targeting Windows 8 Uses Google Docs
Makadocs
2012-11-16Github (DesignativeDave)DesignativeDave
Remote Administration Tool for Android devices
AndroRAT
2012-11-16Information on Security BlogKeith Tyler
China Chopper Webshell - the 4KB that Owns your Web Server
2012-11-14Contagiodump BlogMila Parkour
Group Photos.zip OSX/Revir | OSX/iMuler samples March 2012-November 2012
iMuler
2012-11-13SophosGraham Cluley
New variant of Mac Trojan discovered, targeting Tibet
iMuler
2012-11-05MalwarebytesJérôme Segura
Citadel: a cyber-criminal’s ultimate weapon?
Citadel
2012-11-01Virus BulletinMicky Pun
Tracking the 2012 Sasfis campaign
Asprox Sasfis
2012-10-30Trend MicroJohanne Demetria
JACKSBOT Has Some Dirty Tricks up Its Sleeves
jRAT
2012-10-23Trend MicroJames T. Bennett, Nart Villeneuve
Detecting APT Activity with Network Traffic Analysis
Enfal Gh0stnet Nitro sykipot taidoor
2012-10-16Trend MicroBernadette Irinco
The DORKBOT Rises
NgrBot