Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2013-09-01Eternal TodoJose Miguel Esparza
Yet another Andromeda / Gamarue analysis
Andromeda
2013-08-27AvastPeter Kálnai
Linux Trojan “Hand of Thief” ungloved
Hand of Thief
2013-08-25AusCERTParth Shukla
The Compromised Devices of the Carna Botnet
2013-08-23FireEyeNart Villeneuve, Ned Moran, Thoufique Haq
Operation Molerats: Middle East Cyber Attacks Using Poison Ivy
Poison Ivy Molerats
2013-08-14VirusTotalVirusTotal
VT Report for a sample
GSpy
2013-08-13KrebsOnSecurityBrian Krebs
Inside a ‘Reveton’ Ransomware Operation
Reveton
2013-08-13MalwareTechMalwareTech
PowerLoader Injection – Something truly amazing
PowerLoader
2013-08-12FireEyeNart Villeneuve, Ned Moran
Survival of the Fittest: New York Times Attackers Evolve Quickly
yayih
2013-08-12ContagioExchangeMila Parkour
Taleret strings - APT (1)
Taleret
2013-08-07RSALimor Kessem
Thieves Reaching for Linux—”Hand of Thief” Trojan Targets Linux #INTH3WILD
Hand of Thief
2013-08-07FireEyeDennis Hanzlik, Ian Ahl, Tony Lee
Breaking Down the China Chopper Web Shell - Part I
CHINACHOPPER
2013-08-02CitizenLabKatie Kleemola, Seth Hardy
Surtr Malware Family Targeting the Tibetan Community
surtr
2013-08-01Virus BulletinSuweera De Souza
Andromeda 2.7 features
Andromeda
2013-08-01MalwarebytesJoshua Cannell
Sophos Discovers ZeroAccess Using RLO
ZeroAccess
2013-07-31SecureworksJoe Stewart
Secrets of the Comfoo Masters
Comfoo
2013-07-30ESET Researchwelivesecurity
Versatile and infectious: Win64/Expiro is a cross‑platform file infector
Expiro
2013-07-25MalwarebytesJoshua Cannell
ZeroAccess uses Self-Debugging
ZeroAccess
2013-07-22AvastPeter Kálnai
Multisystem Trojan Janicab attacks Windows and MacOSX via scripts
Janicab
2013-07-19BlackHatJason Geffner
End-to-End Analysis of a Domain Generating Algorithm Malware Family
SuppoBox
2013-07-15F-SecureBroderick Aquilino
Signed Mac Malware Using Right-to-Left Override Trick
Janicab