Difference between revisions of "Category:Publications"
Jump to navigation
Jump to search
(previous page) (next page)
(No difference)
|
Latest revision as of 18:19, 29 November 2014
This category uses the form Publication.
Pages in category "Publications"
The following 189 pages are in this category, out of 789 total.
(previous page) (next page)T
- Tales from Crisis, Chapter 1: The dropper’s box of tricks
- Tales from Crisis, Chapter 2: Backdoor’s first steps
- Tales from Crisis, Chapter 3: The Italian rootkit job
- Tales from Crisis, Chapter 4: a ghost in the network
- Targeted attacks and Ukraine
- Targeted destructive malware explained: Troj/Mdrop-ELD
- Targeted information stealing attacks in South Asia use email, signed binaries
- Tatanga attack exposes chipTAN weaknesses
- Tatanga: a new banking trojan with MitB functions
- TDI - a new element in old TDSS story
- TDL3 : The rootkit of all evil
- TDL3 : Why so serious
- TDL4 - Top Bot
- TDL4 reloaded: Purple Haze all in my brain
- TDSS botnet: full disclosure
- Tequila botnet leads to phishing attack
- The "Red October" campaign - An advanced cyber espionage network targeting diplomatic and government agencies
- The 'Penquin' Turla
- The ACCDFISA malware family – Ransomware targeting Windows servers
- The ACCDFISA malware family – Ransomware targetting Windows servers
- The anatomy of a botnet
- The Andromeda/Gamarue botnet is on the rise again
- The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet
- The case of TDL3
- The Coreflood report
- The Cridex trojan targets 137 financial organizations in one go
- The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements
- The DGA of Symmi
- The Dorkbot rises
- The Elderwood project (infographic)
- The Epic Turla operation
- The evolution of TDL: conquering x64
- The evolution of webinjects
- The first trojan in history to steal Linux and Mac OS X passwords
- The Flame: questions and answers
- The good , the bad and the unknown online scanners
- The graphic design of "Maktub Locker" ransomware
- The growing threat to business banking online
- The IMDDOS botnet: discovery and analysis
- The life cycle of web server botnet recruitment
- The lifecycle of peer-to-peer (Gameover) ZeuS
- The Madi campaign - Part II
- The Miner botnet: Bitcoin mining goes peer-to-peer
- The MiniDuke mystery: PDF 0-day government spy assembler 0x29A micro backdoor
- The Mirage campaign
- The most sophisticated Android trojan
- The mystery of Duqu framework solved
- The mystery of Duqu: part five
- The mystery of Duqu: part one
- The mystery of Duqu: part six (the command and control servers)
- The mystery of Duqu: part ten
- The mystery of Duqu: part three
- The mystery of Duqu: part two
- The mystery of the Duqu framework
- The new era of botnets
- The Pobelka botnet - a command and control case study
- The real face of Koobface: the largest web 2.0 botnet explained
- The resurrection of RedKit
- The rise of TOR-based botnets
- The Sality botnet
- The Target breach by the numbers
- The tigger trojan: icky, sticky stuff
- The underground economy of spam: a botmaster's perspective of coordinating large-scale spam campaigns
- The Waledac protocol: the how and why
- The where and why of Hlux
- The world's biggest botnets
- The ZeroAccess botnet revealed
- The ZeroAccess botnet: mining and fraud for massive financial gain
- The ZeroAccess rootkit
- The ‘advertising’ botnet
- The ‘Madi’ infostealers - a detailed analysis
- The “Hikit” rootkit: advanced and persistent attack techniques (part 1)
- The “Hikit” rootkit: advanced and persistent attack techniques (part 2)
- Threat spotlight: Angler lurking in the domain shadows
- Three month FrameworkPOS malware campaign nabs ~43,000 credit cards from point of sale systems
- Tilon-son of Silon
- Tilon/SpyEye2 intelligence report
- TinyNuke may be a ticking time bomb
- Tis the season for shipping and phishing
- Top 50 bad hosts & networks 2011 Q4
- Top spam botnets exposed
- Torpig - Back to the future or how the most sophisticated trojan in 2008 reinvents itself
- TorrentLocker ransomware uses email authentication to refine spam runs
- TR-24 analysis - Destory RAT family
- Tracking down the author of the PlugX RAT
- Traffic direction systems as malware distribution tools
- Travnet botnet steals huge amount of sensitive data
- Travnet trojan could be part of APT campaign
- TreasureHunt: a custom POS malware tool
- Trend Micro discovers MalumPoS; malware targeting hotels and other US industries
- Trojan ChePro, the CPL storm
- Trojan downloaders on the rise: don’t let Locky or TeslaCrypt ruin your day
- Trojan horse using sender policy framework
- Trojan moves its configuration to Twitter, LinkedIn, MSDN and Baidu
- Trojan Nap aka Kelihos/Hlux - Feb. 2013 status update
- Trojan on the loose: an in-depth analysis of police trojan
- Trojan.Prinimalka: bits and pieces
- Trojan.Ransomgerpo criminal arrested
- Trojan.Taidoor takes aim at policy think tanks
- Trojan.Tatanarg.B careful!
- Trojan.Whitewell: what’s your (bot) Facebook status today?
- Trojan.ZeroAccess infection analysis
- Trusteer warns of new two headed trojan attack against online banks
- Twitter + Pastebin = malware update
U
- Un WOMBAT pour évaluer la cybercriminalité
- Under the hood of Carberp: Malware & configuration analysis
- Under the hood of the cyber attack on U.S. banks
- Unexpected reboot: Necurs
- Unveiling an Indian cyberattack infrastructure - a special report
- Unveiling the network criminal infrastructure of TDSS/TDL4 - DGAv14: a case study on a new TDSS/TDL4 variant
- Upas Kit (aka Rombrast) integrates webinjects
- Upatre, Dyre used in Univ. of Florida attack
- Update to Citadel : 1.3.5.1 Rain Edition.
- Update to Citadel : v.1.3.4.5
- Updated Sundown Exploit Kit Uses Steganography
- Urausy has big plan for Europe - Targeting 3 new countries among which Norway !
- Urausy improving its localization - A (the\?) Gaelic Ransomware with Interpol impersonation as default landing
- Urausy ransomware - July 2013 design refresh - "Summer 2013 collection"
- Urausy: Colorfull design refresh (+HR) & EC3 Logo
- Uroburos: the snake rootkit
- Using libemu to create malware flow graph
V
- Vawtrak gains momentum and expands targets
- Versatile and infectious: Win64/Expiro is a cross-platform file infector
- VinSelf - A new backdoor in town
- ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar
- Virus Gendarmerie : variante Office Centrale de Luttre contre la criminalité – controle informationnel
- Virus scanners for virus authors
- Virus scanners for virus authors, part II
- Virut malware fuels Waledac botnet resurgence
- VOlk-botnet takes over Latin America
W
- W32.Changeup: how the worm was created
- W32.Duqu, the precursor to the next Stuxnet
- W32.Flamer: spreading mechanism tricks and exploits
- W32.Qakbot in detail
- W32.Shadesrat (Blackshades) author arrested
- W32.Stuxnet dossier
- W32.Tinba (Tinybanker) The turkish incident
- W32.Xpaj.B: making easy money from complex code
- Waledac Botnet - Deployment and Communication Analysis
- Waledac gets cozy with Virut
- Walking through Win32/Jabberbot.A instant messaging C&C
- Watch out for CoreBot, new stealer in the wild
- Weelsof use SSL C&C
- What was that Wiper thing?
- What’s the buzz with Bafruz
- Where Are They Today? Cybercrime Trojans That No One Misses: Shifu Malware
- Who's behind the Koobface botnet? - An OSINT analysis
- Who's behind the world's largest spam botnet?
- Why forums? An empirical analysis into the facilitating factors of carding forums
- Win32/64:Napolar: New trojan shines on the cyber crime-scene
- Win32/Gataka - or should we say Zutick?
- Win32/Gataka banking Trojan - Detailed analysis
- Win32/Gataka: a banking Trojan ready to take off
- Win32/Sality newest component: a router’s primary DNS changer named Win32/RBrute
- Win32/Spy.Ranbyus modifying Java code in RBS Ukraine systems
- Win32/Virlock: First Self-Reproducing Ransomware is also a Shape Shifter
- Win32/Vundo
- Winlock affiliate
- Wire Transfer Spam Spreads Upatre
- Worm:VBS/Jenxcus
X
Y
Z
- ZACCESS/SIREFEF arrives with new infection technique
- ZeroAccess - new steps in evolution
- ZeroAccess anti-debug uses debugger
- ZeroAccess rootkit launched by signed installers
- ZeroAccess's way of self-deletion
- ZeroAccess: code injection chronicles
- Zeroing in on malware propagation methods
- ZeroLocker won't come to your rescue
- ZeuS Gameover overview
- ZeuS ransomware feature: win unlock
- ZeuS v2 Malware Analysis - Part II
- Zeus variant Floki bot targets PoS data
- ZeuS – P2P+DGA variant – mapping out and understanding the threat
- ZeuS-P2P monitoring and analysis
- ZeuS: me talk pretty Finnish one day
- ZeuSbot/Spyeye P2P updated, fortifying the botnet
- Zorenium bot not half the threat it claims to be