Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-12-07SymantecSymantec
Backdoor.Cadelspy and Backdoor.Remexi: indicators of compromise
CadelSpy Remexi
2015-12-07FlashpointFlashpoint, Talos
Flashpoint and Talos Analyze the Curious Case of the flokibot Connector
FlokiBot
2015-12-04Kaspersky LabsGReAT
Sofacy APT hits high profile targets with updated toolset
Coreshell Sedreco Seduploader X-Agent APT28
2015-12-04Kaspersky LabsGReAT
Sofacy APT hits high profile targets with updated toolset
Sedreco
2015-12-03360 Internet Security CenterYa Liu
Automatically Classifying Unknown Bots by The REGISTER Messages
MrBlack XOR DDoS DarkShell
2015-12-03SymantecSymantec Security Response
Colombians major target of email campaigns delivering Xtreme RAT
Xtreme RAT
2015-12-02BotconfPeter Kleissner
Sality: 2003 - Today
Sality
2015-12-01Trend MicroErika Mendoza, Jay Yaneza
Operation Black Atlas Endangers In-Store Card Payments and SMBs Worldwide; Switches between BlackPOS and Other Tools
Alina POS BlackPOS Kronos NewPosThings
2015-12-01CERT.PLCERT.PL
ZeuS-P2P monitoring and analysis
Gameover P2P
2015-12-01FireEyeFireEye Threat Intelligence
China-based Cyber Threat Group Uses Dropbox for Malware Communications and Targets Hong Kong Media Outlets
BUBBLEWRAP LOWBALL TEMPER PANDA
2015-11-300x3A SecurityYonathan Klijnsma
Inside Braviax/FakeRean: An analysis and history of a FakeAV family
2015-11-27Twitter (@PhysicalDrive0)PhysicalDrive0
Tweet on ModPOS
ModPOS
2015-11-25RSARSA
Detecting GlassRAT using Security Analytics and ECAT
GlassRAT
2015-11-24FireEyeStephen Ward
ModPOS: Highly-Sophisticated, Stealthy Malware Targeting US POS Systems with High Likelihood of Broader Campaigns
ModPOS
2015-11-23MinervaLabsClearSky, MinervaLabs
CopyKittens Attack Group
CopyKittens
2015-11-20Jos Wetzels
A king's ransom: an analysis of the CTB-locker ransomware
CTB Locker
2015-11-20MicrosoftMicrosoft
Microsoft Security Intelligence Report Volume 19
XTunnel
2015-11-19JPCERT/CCYou Nakatsuru
Decrypting Strings in Emdivi
Emdivi
2015-11-17SpiderLabs BlogEric Merritt
New Memory Scraping Technique in Cherry Picker PoS Malware
CherryPicker POS
2015-11-16Nick Hoffman
Introducing LogPOS
LogPOS