Difference between revisions of "Category:Publications"
Jump to navigation
Jump to search
(previous page) (next page)
(No difference)
|
Latest revision as of 18:19, 29 November 2014
This category uses the form Publication.
Pages in category "Publications"
The following 200 pages are in this category, out of 789 total.
(previous page) (next page)M
- More Flame/Skywiper CNC behavior uncovered
- Morto worm sets a (DNS) record
- MoVP 1.3 Desktops, heaps, and ransomware
- MP-DDoser: A rapidly improving DDoS threat
- MP-DDoser:Monitoring a rapidly improving DDoS threat
- Mpack installs ultra-invisible trojan
- MSIE 0-day exploit CVE-2014-0322 - Possibly targeting French aerospace association
- MSRT April 2012: Win32/Claretore
- MSRT April 2014 – Ramdo
- MSRT June '12 - cleanup on aisle one
- MSRT March 2012: breaking bad
- MSRT march: three hioles in one
- MSRT November '12 - Weelsof around the world
- MSRT September '12 - Medfos, hijacking your daily search
- Multitenancy Botnets thwart threat analysis
- Mysterious Avatar rootkit with API, SDK, and Yahoo Groups for C&C communication
N
- NASK shuts down dangerous Virut botnet domains
- Necurs Quick Analysis
- Neosploit gets Java 0-Day
- Nepalese government websites compromised to serve Zegost RAT
- NetTraveler APT gets a makeover for 10th birthday
- NetTraveler is back: the 'Red Star' APT returns with new tricks
- New Apple Mac trojan called OSX/Crisis discovered
- New Chinese exploit pack
- New crimeware attacks LatAm bank users
- New crypto-ransomware emerge in the wild
- New crypto-ransomware JIGSAW plays nasty games
- New CryptoLocker spreads via removable drives
- New Duqu sample found in the wild
- New GamaPoS malware piggybacks on Andromeda botnet; spreads in 13 US states
- New IceIX (ZeuS variant) changes its encryption method (again)
- New IE Zero-Day used in targeted attacks
- New Mac malware discovered on attendee computer at anti-surveillance workshop
- New Mahdi updates, new C2 server
- New point-of-sale malware distributed by Andromeda botnet
- New POS malware emerges - Punkey
- New PoS malware “Backoff” targets US
- New ransomware plays its victims an audio file, over and over and over…
- New RATs emerge from leaked Njw0rm source code
- New Thor botnet nearly ready to be sold, price $8,000
- New trojan found: Admin.HLP leaks organizations data
- New virus SMSZombie.A discovered by TrustGo Security Labs
- New Xtreme RAT attacks US, Israel, and other foreign governments
- Newly detected Crisis virus infects Windows, Macs and virtual machines
- Newly launched ‘HTTP-based botnet setup as a service’ empowers novice cybercriminals with bulletproof hosting capabilities
- NewPosThings has new PoS things
- NGRBot spreads via chat
- Ngrbot steals information and mine Bitcoins
- NitlovePOS: another new POS malware
- Nitol DDoS botnet discovered in China
- NjRAT & H-Worm variant infections continue to rise
- Not just a one-trick PonyDOS
- Now you Z-(eus) it, now you don’t: ZeuS bots silently upgraded to Citadel
- Nuevo botnet contra Mexico: Karn!v0r3x
- Nymaim - obfuscation chronicles
O
- Obama order sped up wave of cyberattacks against Iran
- Olmasco bootkit: next circle of TDL4 evolution (or not)
- On botnets that use DNS for command and control
- On the analysis of the ZeuS botnet crimeware toolkit
- One bot to rule them all
- One Sinowal trojan + one gang = hundreds of thousands of compromised accountS
- One-man PoS malware operation captures 22,000 credit card details in Brazil
- Operation Bot Roast II
- Operation SnowMan: DeputyDog actor compromises US veterans of foreign wars website
- Operation Socialist The Inside Story Of How British Spies Hacked Belgium’s Largest Telco
- OphionLocker: Joining in the Ransomware Race
- OSX Kitmos analysis
- OSX.iService its not going to iWork for you
- OSX.Iservice technical details
- OSX/Crisis has been used as part of a targeted attack
- OSX/Flashback - The first malware to infect hundreds of thousands of Apple Mac
- Over 9 million PCs infected - ZeroAccess botnet uncovered
- Overcoming reputation and proof-of-work systems in botnets
- Overview: inside the ZeuS trojan’s source code
- Owning Kraken zombies
P
- P2P botnet Kelihos.B with 100.000 nodes sinkholed
- Panda Security uncovers bot-killing malware
- Panel Gendarmerie
- Panel Supern0va et virus gendarmerie
- Panel Virus Gendarmerie : Ratio 0.36%
- Part virus, part botnet, spreading fast: Ramnit moves past Facebook passwords
- Peer-to-peer botnets: overview and case study
- PeerRush: mining for unwanted P2P traffic
- PETYA crypto-ransomware overwrites MBR to lock users out of their computers
- Petya ransomware skips the files and encrypts your hard drive instead
- Pitou, The “silent” resurrection of the PITOU notorious Srizbi kernel spambot
- Playing cops & robbers with banks & browsers
- PlugX malware: A good hacker is an apologetic hacker
- PlugX: new tool for a not so new campaign
- PlugX: some uncovered points
- Poison Ivy 2.3.0 Documentation
- Poison Ivy: assessing damage and extracting intelligence
- Poisoned search results: How hackers have automated search engine poisoning attacks to distribute malware
- PoisonIvy adapts to communicate through authentication proxies
- PokerAgent botnet stealing over 16,000 Facebook credentials
- Police Trojan crosses the Atlantic, now targets USA and Canada
- Ponmocup analysis
- PoS RAM scraper malware; past, present and future
- Post-mortem of a zombie: Conficker cleanup after six years
- Pramro and Sality - two PEs in a pod
- Proactive detection of network security incidents
- Proactive detection of security incidents II - Honeypots
- Proactive policy measures by Internet service providers against Botnets
- Probing the Gozi-Prinimalka campaign
- Pushdo botnet gets DGA update, over 6,000 machines host new variant
Q
R
- Ramnit goes social
- Ransom.II - UGC payment for USA - Windows Genuine impersonation for DE
- Ransomware : la sulfureuse hypothèse sur la situation chez Norsk Hydro
- Ransomware : Smile you're on camera - Reveton.C new landing pages
- Ransomware and Silence Locker control panel
- Ransomware Casier - Sharing Design with Lyposit - Gaelic & Persian (
- Ransomware crimeware kits
- Ransomware Fake Microsoft Security Essentials
- Ransomware gets professional, targeting Switzerland, Germany and Austria
- Ransomware or Wiper? LockerGoga Straddles the Line
- Ransomware report: the rise of BandarChor
- Ransomware « Trojan.Casier » Panel
- Ransomware ‘Holds Up’ victims
- Ransomware: playing on your fears
- Redkit - one account = one color
- Redkit : No more money ! Traffic US, CA, GB, AU
- Relentless Zbot and anti-emulations
- Research Win32/Slenfbot
- Researchers: Bredolab still lurking, though severely injured
- Reversing Andromeda-Gamarue botnet
- Reversing malware loaders - The Matsnu-A Case
- Reversing the wrath of Khan
- Reveton += HU, LV, SK, SI, TR (!), RO - So spreading accross Europe with 6 new Design
- Reveton Autumn Collection += AU,CZ, IE, NO & 17 new design
- Reveton can speak now !
- REVETON Ransomware Spreads with Old Tactics, New Infection Method
- Reveton.A
- REvil ransomware gang's web sites mysteriously shut down
- Richard Clarke on who was behind the Stuxnet attack
- RIG exploit kit strikes oil
- Rmnet.12 created a million Windows computer botnet
- RootSmart Android malware
- RootSmart malware utilizes GingerBreak root exploit
- Rovnix bootkit framework updated
- Rovnix Reloaded: new step of evolution
- Rovnix.D: the code injection story
- Russian service online to check the detection of malware
- Réflexions pour un plan d'action contre les botnets
S
- SamSam ransomware designed to inundate targeted networks with thousands of copies of itself
- SamSam Ransomware Evolves Its Tactics Towards Targeting Whole Companies
- Saudi Aramco hit by computer virus
- Say hello to Tinba: world’s smallest trojan-banker
- Scareware locks down computer due to child porn and terrorism
- SDBot IRC botnet continues to make waves
- Secrets of the Comfoo masters
- Security alert: new Android malware - TigerBot - identified in alternative markets
- Security alert: new TGLoader Android malware utilizes the exploid root exploit
- Security alert: new variants of Legacy Native (LeNa) identified
- Security alert: SpamSoldier
- Security experts detected new Twitter-controlled botnet
- Security Response Android.Counterclank
- SGNET: a worldwide deployable framework to support the analysis of malware threat models
- Shamoon the wiper - copycats at work
- Shamoon the Wiper in details
- Shamoon the Wiper: further details (Part II)
- Shedding light on the NeoSploit Exploit Kit
- Shylock financial malware back 'with a vengeance'
- SIM-ple: mobile handsets are weak link in latest online banking fraud scheme
- Sinowal analysis (Windows 7, 32-bit)
- Sinowal: MBR rootkit never dies! (and it always brings some new clever features)
- Sinowal: the evolution of MBR rootkit continues
- SIRv12
- SIRv12: the obstinacy of Conficker
- Skunkx DDoS bot analysis
- Skynet, a Tor-powered botnet straight from Reddit
- SKyWIper: A complex malware for targeted attacks
- Smartcard vulnerabilities in modern banking malware
- Social networks – A bonanza for cybercriminals
- Sony PlayStation's site SQL injected, redirecting to rogue security software
- Sony/Destover: mystery North Korean actor’s destructive and past network activity
- Sopelka Botnet: three banking trojans and one banking panel
- Source Code for IoT Botnet ‘Mirai’ Released
- Spam botnets: The fall of Grum and the rise of Festi
- Spambot evolution 2011
- SPL exploit kit – now with CVE-2013-0422
- Spread of Darkness...Details on the public release of the Darkness DDoS bot
- SpyEye being kicked to the curb by its customers?
- Stamp EK (aka SofosFO) now showing "Blackhole 2.0 Like" landing pages
- Static analysis of Dalvik bytecode and reflection in Android
- Stealing money from ATMs with malware
- Stealthy peer-to-peer C&C over SMB pipes
- Stealthy router-based botnet worm squirming
- Step-by-step reverse engineering malware: ZeroAccess / Max++ / Smiscer crimeware rootkit
- Stolen passwords allowed hackers to steal over one billion rubles
- Study of malware obfuscation techniques
- Survey on network-based botnet detection methods
- Symantec/Android.Ackposts
- Symantec/Android.Maistealer
- Symantec/Backdoor.Arcomrat
- Symantec/W32.Zorenium