Click here to download all references as Bib-File.
2016-02-29 ⋅ Sophos ⋅ The “HawkEye” attack: how cybercrooks target small businesses for big money HawkEye Keylogger |
2015-11-02 ⋅ Sophos ⋅ Troj/Cryakl-B Cryakl |
2014-06-27 ⋅ SophosLabs ⋅ PlugX - The Next Generation PlugX |
2014-01-21 ⋅ Sophos Naked Security ⋅ Digitally signed data-stealing malware targets Mac users in “undelivered courier item” attack Laoshu |
2013-08-01 ⋅ Malwarebytes ⋅ Sophos Discovers ZeroAccess Using RLO ZeroAccess |
2013-03-05 ⋅ Sophos Naked Security ⋅ Russian ransomware takes advantage of Windows PowerShell FTCODE |
2012-11-27 ⋅ Sophos ⋅ Threat Description: Troj/Ployx-A ployx |
2012-11-13 ⋅ Sophos ⋅ New variant of Mac Trojan discovered, targeting Tibet iMuler |
2012-08-30 ⋅ Sophos ⋅ Troj/Binanen-B Binanen |
2011-04-16 ⋅ Sophos ⋅ Troj/Sasfis-O Sasfis |
2010-07-24 ⋅ Sophos ⋅ Why won’t my sample run? Zeus |
2009-04-01 ⋅ Sophos Labs ⋅ Conficker.C A Technical Analysis |