- [Malekal] Phishing via un ransomware Hadopi
- [SecList]Blog: Hashcat's GPU-accelerated Gauss encryption cracker
- [MCAFEE]Cyberwarfare Inspires Analysts, Coverage on YouTube, Twitter
- [Technet]Microsoft Rings in the New Year with More Retail Store Locations on the Way
- [ThreatPost]Chrome Clickjacking Vulnerability Could Expose User Information on Google, Amazon
- [ThreatPost]Bans on Employer Demands for Personal Passwords Go Into Effect
- [Eset]Phishing and malware ? keep Smiling through?*
- [Trend]Why is the Watering Hole Technique Effective?
- [Sophos]Be careful opening bikini screensavers - malware hides inside
- [SecListe]Hashcat's GPU-accelerated Gauss encryption cracker
- [Eset]The Industrialization of Malware: One of 2012?s darkest themes persists
- [Sophos]Zero day vulnerability in Internet Explorer being used in targeted attacks, FixIt now available
- [ThreatPost]Microsoft Responds to IE Zero Day Used in CFR Watering Hole Attack
- [Sophos]PowerPoint about the Mayan "end of the world" secretly boobytrapped with malware
- [ThreatPost]Senate Reauthorizes FISA, Rejects Proposed Privacy Amendments
- [ThreatPost]Microsoft Responds to IE Zero Day Used in CFR Watering Hole Attack
- [ThreatPost]Tool Aids in Cracking Mysterious Gauss Malware Encryption
- [Trend]What Kind of Targeted Attacks Will We See in 2013?
- [ThreatPost]Council on Foreign Relations Website Hit by Watering Hole Attack, IE Zero-Day Exploit
- [ThreatPost]Nvidia Display Driver Service Attack Escalates Privileges on Windows Machines
- [Eset]Phishing and the Smile on the Face of the Tiger
- [MMPC]Update signature definitions to resolve performance issues in definitions starting with 1.141.2400.0
- [Krebs] Exploring the Market for Stolen Passwords
- [Krebs] Attackers Target Internet Explorer Zero-Day Flaw
- [Malekal] Phishing via un ransomware Hadopi
- [SecList]Descriptions: Trojan-Downloader.Win32.Genome.bxzy
- [SecList]Descriptions: Trojan-Downloader.Win32.VB.ahql
- [SecList]Descriptions: Trojan-Downloader.Win32.Agent.gdmw
- [SecList]Descriptions: Trojan-Downloader.Java.Agent.mm
- [SecList]Descriptions: Exploit.JS.Agent.bgz
- [SecList]Descriptions: Trojan-Downloader.JS.Agent.egv
- [SecList]Descriptions: Trojan-Downloader.Java.Agent.kj
- [SecList]Descriptions: Trojan-Downloader.HTML.Agent.wp
- [SecList]Descriptions: Trojan.Win32.Reboot.h
- [SecList]Descriptions: Trojan.VBS.StartPage.hw
- [SecList]Blog: Malware in the Amazon App Store
- [Trend]Mobile Ad Networks: How Do They Operate?
- [SecList]Descriptions: Trojan.BAT.KillWin.gh
- [Technet]Daily Update, Dec. 21st ? More Must-Have Apps and Special Holiday Offers
- [Trend]The Trends in Targeted Attacks of 2012
- [SecList]Descriptions: Trojan.BAT.KillWin.gg
- [Technet]Weekend Reading: Dec. 21st Edition ? Bing Puts the Spotlight on Images, Xbox Windows Phone Favorites on Sale and the Year in Review on MSN
- [Trend]Backdoor Disguised as Java Server Page Targets Web-hosting Servers
- [SecList]Descriptions: Trojan-Downloader.HTML.Agent.ry
- [Technet]Daily Update, Dec. 20th ? On the First Day of Christmas, the Windows Store Gave to Me?Twelve Apps for the Holidays
- [Trend]New Gadget + the Internet = New Threat
- [SecList]Analysis: Spam in November 2012
- [Technet]Daily Update, Dec. 19th ? Better Watch Out, Better Not Cry? Microsoft Works with NORAD to Track Santa on Christmas Eve
- [Trend][INFOGRAPHIC] Windows 8 Steps Up with Security Features
- [SecList]Descriptions: Exploit.Win32.Pidief.ddn