Click here to download all references as Bib-File.•
| 2016-03-11
⋅
Malwarebytes
⋅
Cerber ransomware: new, but mature Cerber |
| 2016-03-10
⋅
Proofpoint
⋅
Death Comes Calling: Thanatos/Alphabot Trojan Hits the Market Thanatos |
| 2016-03-09
⋅
SOFTPEDIA® NEWS
⋅
Korean Energy and Transportation Targets Attacked by OnionDog APT OnionDog |
| 2016-03-08
⋅
FireEye
⋅
SOUTHEAST ASIA: AN EVOLVING CYBER THREAT LANDSCAPE APT5 |
| 2016-03-07
⋅
Github (xl7dev)
⋅
RedHat Hacker.asp RedHat Hacker WebShell |
| 2016-03-06
⋅
Github (TKCERT)
⋅
Network detector for Winnti malware Winnti |
| 2016-03-06
⋅
Palo Alto Networks Unit 42
⋅
New OS X Ransomware KeRanger Infected Transmission BitTorrent Client Installer KeRanger |
| 2016-03-06
⋅
The DGA of PadCrypt PadCrypt |
| 2016-03-04
⋅
SANS
⋅
Tracing the Lineage of DarkSeoul httpdropper |
| 2016-03-03
⋅
Kaspersky Labs
⋅
Attack on Zygote: a new twist in the evolution of mobile threats Triada |
| 2016-03-02
⋅
RSA Conference
⋅
Dissecting Derusbi Derusbi |
| 2016-03-01
⋅
Trend Micro
⋅
Shrouded Crossbow Creators Behind BIFROSE for UNIX KIVARS |
| 2016-03-01
⋅
Group-IB
⋅
BUHTRAP: The Evolution of Targetted Attacks Against Financial Instituitions BuhTrap |
| 2016-03-01
⋅
PWC
⋅
Taiwan Presidential Election: A Case Study on Thematic Targeting SunOrcal |
| 2016-03-01
⋅
Trend Micro
⋅
Operation C-Major: Information Theft Campaign Targets Military Personnel in India Operation C-Major |
| 2016-03-01
⋅
Malwarebytes
⋅
Look Into Locky Ransomware Locky |
| 2016-03-01
⋅
Proofpoint
⋅
Operation Transparent Tribe Andromeda beendoor Bezigate Crimson RAT Luminosity RAT Operation C-Major |
| 2016-02-29
⋅
Palo Alto Networks Unit 42
⋅
New Malware ‘Rover’ Targets Indian Ambassador to Afghanistan Rover |
| 2016-02-29
⋅
Sophos
⋅
The “HawkEye” attack: how cybercrooks target small businesses for big money HawkEye Keylogger |
| 2016-02-26
⋅
Proofpoint
⋅
Nymaim Moves Past Its Ransomware Roots - What Is Old Is New Again Nymaim |