- [MCAFEE]Narilam Trojan Targets Iranian Financial Software
- [Technet]Daily Update, Jan. 3rd ? Building a State-of-the-Art Speller for Bing
- [ThreatPost]Study: 94 Percent of Healthcare Organizations Breached
- [ThreatPost]Fraudulent Certificate for Google Domains Found After Mistake by Turkish CA
- [Trend]Holiday Season Unwraps Phishing, Blackhole Exploit Attacks
- [Sophos]Report: 94% of US hospitals suffered data breaches, and 45% had quintuplets
- [MCAFEE]Operation High Roller Campaign Attempts to Steal ?61,000 From German Banks
- [Technet]The Windy City Teams with Microsoft on Cloud Strategy
- [ThreatPost]SQL Injection Flaw Haunts All Ruby on Rails Versions
- [ThreatPost]Energy Manufacturer Also Victimized by IE Zero Day in Watering Hole Attack
- [Eset]2013 Forecast: Malware, scams, security and privacy concerns
- [Trend]Social Networking Threats to Think About As 2012 Ends
- [Sophos]Mickey Virus: Bollywood movie jumps on hacking bandwagon
- [Krebs] Does Your Alarm Have a Default Duress Code?
- [Krebs] Turkish Registrar Enabled Phishers to Spoof Google
- [MalwareBytes] Web Exploits: a bright future ahead
- [Malekal] chickenkiller.com : vbe qui charge du BitCoin
- [Malekal] Phishing via un ransomware Hadopi
- [SecList]Blog: Hashcat's GPU-accelerated Gauss encryption cracker
- [MCAFEE]Cyberwarfare Inspires Analysts, Coverage on YouTube, Twitter
- [Technet]Microsoft Rings in the New Year with More Retail Store Locations on the Way
- [ThreatPost]Chrome Clickjacking Vulnerability Could Expose User Information on Google, Amazon
- [ThreatPost]Bans on Employer Demands for Personal Passwords Go Into Effect
- [Eset]Phishing and malware ? keep Smiling through?*
- [Trend]Why is the Watering Hole Technique Effective?
- [Sophos]Be careful opening bikini screensavers - malware hides inside
- [SecListe]Hashcat's GPU-accelerated Gauss encryption cracker
- [Eset]The Industrialization of Malware: One of 2012?s darkest themes persists
- [Sophos]Zero day vulnerability in Internet Explorer being used in targeted attacks, FixIt now available
- [ThreatPost]Microsoft Responds to IE Zero Day Used in CFR Watering Hole Attack
- [Sophos]PowerPoint about the Mayan "end of the world" secretly boobytrapped with malware
- [ThreatPost]Senate Reauthorizes FISA, Rejects Proposed Privacy Amendments
- [ThreatPost]Microsoft Responds to IE Zero Day Used in CFR Watering Hole Attack
- [ThreatPost]Tool Aids in Cracking Mysterious Gauss Malware Encryption
- [Trend]What Kind of Targeted Attacks Will We See in 2013?
- [ThreatPost]Council on Foreign Relations Website Hit by Watering Hole Attack, IE Zero-Day Exploit
- [ThreatPost]Nvidia Display Driver Service Attack Escalates Privileges on Windows Machines
- [Eset]Phishing and the Smile on the Face of the Tiger
- [MMPC]Update signature definitions to resolve performance issues in definitions starting with 1.141.2400.0
- [Krebs] Exploring the Market for Stolen Passwords
- [Krebs] Attackers Target Internet Explorer Zero-Day Flaw
- [Malekal] Phishing via un ransomware Hadopi
- [SecList]Descriptions: Trojan-Downloader.Win32.Genome.bxzy
- [SecList]Descriptions: Trojan-Downloader.Win32.VB.ahql
- [SecList]Descriptions: Trojan-Downloader.Win32.Agent.gdmw
- [SecList]Descriptions: Trojan-Downloader.Java.Agent.mm
- [SecList]Descriptions: Exploit.JS.Agent.bgz
- [SecList]Descriptions: Trojan-Downloader.JS.Agent.egv
- [SecList]Descriptions: Trojan-Downloader.Java.Agent.kj
- [SecList]Descriptions: Trojan-Downloader.HTML.Agent.wp