More here: http://conference.hitb.org/hitbsecconf2013ams/materials/D1T1%20-%20Hugo%20Teso%20-%20Aircraft%20Hacking%20-%20Practical%20Aero%20Series.pdf

Cuckoo Sandbox 0.6
http://cuckoosandbox.org/2013-04-15-cuckoo-sandbox-06.html

VirusTotal += PCAP Analyzer
http://blog.virustotal.com/2013/04/virustotal-pcap-analyzer.html

Serial Offenders: Widespread Flaws in Serial Port Servers
https://community.rapid7.com/community/metasploit/blog/2013/04/23/serial-offenders-widespread-flaws-in-serial-port-servers

The Mutter Backdoor: Operation Beebus with New Targets
http://www.fireeye.com/blog/technical/malware-research/2013/04/the-mutter-backdoor-operation-beebus-with-new-targets.html

State of the Internet Report (Q4 2012)
http://www.akamai.com/dl/akamai/akamai_soti_q412_exec_summary.pdf

Mozilla: the Next 15 Years
http://www.h-online.com/open/features/Mozilla-the-Next-15-Years-1837073.html

Regents of Louisiana spreading Sirefef malware
http://blog.avast.com/2013/05/03/regents-of-louisiana-spreading-sirefef-malware/

Windows 8 at 6 months
http://blogs.windows.com/windows/b/bloggingwindows/archive/2013/05/06/windows-8-at-6-months-q-amp-a-with-tami-reller.aspx

“Honeywords” plan to snare password thieves
http://www.h-online.com/security/news/item/Honeywords-plan-to-snare-password-thieves-1858488.html
http://people.csail.mit.edu/rivest/pubs/JR13.pdf

Common OAuth issue you can use to take over accounts
http://webstersprodigy.net/2013/05/09/common-oauth-issue-you-can-use-to-take-over-accounts/

Untangling the Web: A Guide to Internet Research
http://www.nsa.gov/public_info/_files/Untangling_the_Web.pdf

Fraunhofer FOKUS institute releases Fuzzino fuzzing library
http://www.h-online.com/security/news/item/Fraunhofer-FOKUS-institute-releases-Fuzzino-fuzzing-library-1863924.html

Firmware Hacking: The Samsung smart TV turn
http://marcoramilli.blogspot.it/2013/05/firmware-hacking-samsung-smart-tv-turn.html

Vaccinating systems against VM-aware malware
https://community.rapid7.com/community/infosec/blog/2013/05/13/vaccinating-systems-against-vm-aware-malware

Ragebooter: ‘Legit’ DDoS Service, or Fed Backdoor?
https://krebsonsecurity.com/2013/05/ragebooter-legit-ddos-service-or-fed-backdoor/

Grum lives!
http://blog.avast.com/2013/05/22/grum-lives/

Exploiting Samsung Galaxy S4 Secure Boot
http://blog.azimuthsecurity.com/2013/05/exploiting-samsung-galaxy-s4-secure-boot.html

Blackberry Z10 research primer – An initial analysis (by A. Antukh)
https://www.sec-consult.com/fxdata/seccons/prod/downloads/sec_consult_vulnerability_lab_blackberry_z10_initial_analysis_v10.pdf

Analysis of a self-debugging Sirefef cryptor
http://blog.avast.com/2013/05/29/analysis-of-a-self-debugging-sirefef-cryptor/