Click here to download all references as Bib-File.•
| 2014-10-27
⋅
PWC
⋅
ScanBox framework – who’s affected, and who’s using it? Jolob |
| 2014-10-27
⋅
Netresec
⋅
Full Disclosure of Havex Trojans ENERGETIC BEAR |
| 2014-10-22
⋅
⋅
Kaspersky Labs
⋅
Шифровальщик Cryakl или Фантомас разбушевался Cryakl |
| 2014-10-20
⋅
PWC
⋅
OrcaRAT - A whale of a tale OrcaRAT |
| 2014-10-15
⋅
ESET Research
⋅
Operation Windigo: “Good job, ESET!” says malware author Ebury |
| 2014-10-14
⋅
CrowdStrike
⋅
CrowdStrike Discovers Use of 64-bit Zero-Day Privilege Escalation Exploit (CVE-2014-4113) by Hurricane Panda HURRICANE PANDA |
| 2014-10-14
⋅
Symantec
⋅
Security vendors take action against Hidden Lynx malware Gameover P2P HiKit Shylock APT17 |
| 2014-10-14
⋅
Symantec
⋅
Sandworm Windows zero-day vulnerability being actively exploited in targeted attacks Sandworm |
| 2014-10-14
⋅
Symantec
⋅
Sandworm Windows zero-day vulnerability being actively exploited in targeted attacks Sandworm |
| 2014-10-14
⋅
Symantec
⋅
Security vendors take action against Hidden Lynx malware HiKit |
| 2014-10-14
⋅
ESET Research
⋅
CVE‑2014‑4114: Details on August BlackEnergy PowerPoint Campaigns BlackEnergy |
| 2014-10-06
⋅
FireEye
⋅
Data Theft in Aisle 9: A FireEye Look at Threats to Retailers |
| 2014-10-05
⋅
Eternal Todo
⋅
Dissecting SmokeLoader (or Yulia's sweet ass proposition) SmokeLoader |
| 2014-10-03
⋅
Palo Alto Networks Unit 42
⋅
New Indicators of Compromise for APT Group Nitro Uncovered Nitro |
| 2014-10-02
⋅
CrowdStrike
⋅
Occupy Central: The Umbrella Revolution and Chinese Intelligence |
| 2014-10-02
⋅
CodeAndSec
⋅
FinFisher Malware Analysis - Part 2 FinFisher RAT |
| 2014-10-01
⋅
Trend Micro
⋅
Operation Pawn Storm: Using Decoys to Evade Detection |
| 2014-09-30
⋅
FireEye
⋅
OPERATION QUANTUM ENTANGLEMENT NewCT DragonOK |
| 2014-09-29
⋅
MalwareMustDie
⋅
MMD-0028-2014 - Linux/XOR.DDoS: Fuzzy reversing a new China ELF XOR DDoS |
| 2014-09-23
⋅
Snort
⋅
MALWARE-CNC Win.Trojan.Aytoke variant outbound connection Aytoke |