More here: http://conference.hitb.org/hitbsecconf2013ams/materials/D1T1%20-%20Hugo%20Teso%20-%20Aircraft%20Hacking%20-%20Practical%20Aero%20Series.pdf
Cuckoo Sandbox 0.6 http://cuckoosandbox.org/2013-04-15-cuckoo-sandbox-06.html
VirusTotal += PCAP Analyzer http://blog.virustotal.com/2013/04/virustotal-pcap-analyzer.html
Serial Offenders: Widespread Flaws in Serial Port Servers https://community.rapid7.com/community/metasploit/blog/2013/04/23/serial-offenders-widespread-flaws-in-serial-port-servers
The Mutter Backdoor: Operation Beebus with New Targets http://www.fireeye.com/blog/technical/malware-research/2013/04/the-mutter-backdoor-operation-beebus-with-new-targets.html
State of the Internet Report (Q4 2012) http://www.akamai.com/dl/akamai/akamai_soti_q412_exec_summary.pdf
Mozilla: the Next 15 Years http://www.h-online.com/open/features/Mozilla-the-Next-15-Years-1837073.html
Regents of Louisiana spreading Sirefef malware http://blog.avast.com/2013/05/03/regents-of-louisiana-spreading-sirefef-malware/
Windows 8 at 6 months http://blogs.windows.com/windows/b/bloggingwindows/archive/2013/05/06/windows-8-at-6-months-q-amp-a-with-tami-reller.aspx
“Honeywords” plan to snare password thieves http://www.h-online.com/security/news/item/Honeywords-plan-to-snare-password-thieves-1858488.html http://people.csail.mit.edu/rivest/pubs/JR13.pdf
Common OAuth issue you can use to take over accounts http://webstersprodigy.net/2013/05/09/common-oauth-issue-you-can-use-to-take-over-accounts/
Untangling the Web: A Guide to Internet Research http://www.nsa.gov/public_info/_files/Untangling_the_Web.pdf
Fraunhofer FOKUS institute releases Fuzzino fuzzing library http://www.h-online.com/security/news/item/Fraunhofer-FOKUS-institute-releases-Fuzzino-fuzzing-library-1863924.html
Firmware Hacking: The Samsung smart TV turn http://marcoramilli.blogspot.it/2013/05/firmware-hacking-samsung-smart-tv-turn.html
Vaccinating systems against VM-aware malware https://community.rapid7.com/community/infosec/blog/2013/05/13/vaccinating-systems-against-vm-aware-malware
Ragebooter: ‘Legit’ DDoS Service, or Fed Backdoor? https://krebsonsecurity.com/2013/05/ragebooter-legit-ddos-service-or-fed-backdoor/
Grum lives! http://blog.avast.com/2013/05/22/grum-lives/
Exploiting Samsung Galaxy S4 Secure Boot http://blog.azimuthsecurity.com/2013/05/exploiting-samsung-galaxy-s4-secure-boot.html
Blackberry Z10 research primer – An initial analysis (by A. Antukh) https://www.sec-consult.com/fxdata/seccons/prod/downloads/sec_consult_vulnerability_lab_blackberry_z10_initial_analysis_v10.pdf
Analysis of a self-debugging Sirefef cryptor http://blog.avast.com/2013/05/29/analysis-of-a-self-debugging-sirefef-cryptor/