Category:Publications
Jump to navigation
Jump to search
(previous page) (next page)
This category uses the form Publication.
Pages in category "Publications"
The following 200 pages are in this category, out of 789 total.
(previous page) (next page)D
- Disttrack sabotage malware wipes data at unnamed Middle East energy organization
- DNS: a botnet dialect
- Doctor Web a détecté un botnet enrôlant plus de 550 000 Mac
- Doctor Web exposes 550 000 strong Mac botnet
- Domain generation algorithms (DGA) in stealthy malware
- Dorifel crypto malware paralyzes Dutch companies and public sector
- Dorifel is much bigger than expected and it’s still active and growing!
- Dorifel virus gereed voor Nederlandse banking phishing
- Dorifel/Quervar: the support scammer’s secret weapon
- Dorkbot: conquistando Latinoamérica
- Dragonfly Threat Against Western Energy Suppliers
- Dridex learns new trick: P2P over HTTP
- DroidLive New SMS Android Trojan
- Duqu FAQ
- Dutch users served Sinowal for lunch
- Dyre Banking Trojan
E
- Egypt Finfisher intrusion tools and ethics
- Emerging attack vectors - RSA slide deck
- Encyclopedia entry: Win32/Carberp
- Encyclopedia entry: Win32/Conficker
- Encyclopedia entry: Win32/Oderoor
- Equation: the Death Star of malware galaxy
- ESET analyzes first Android file-encrypting, TOR-enabled ransomware
- Esthost taken down - Biggest cybercriminal takedown in history
- Etude sur le fonctionnement du Trojan.Matsnu.1 codant les données des utilisateurs
- EURO Winlocker
- Evolution of Win32Carberp: going deeper
- Exploring the market for stolen passwords
F
- F-Secure has discovered MiniDuke malware samples in the wild
- Fake FBI Ransomware analysis
- FAQ on Kelihos.B/Hlux.B sinkholing
- Fast look at an infection by a Blackhole Exploit Kit 2.0
- Fast look at Sundown EK
- FBI ransomware now targeting Apple’s Mac OS X users
- FBI shuts down Coreflood botnet, zombies transmitting financial data
- Feodo - a new botnet on the rise
- Festi botnet analysis & investigation
- FighterPOS: a new one-man PoS malware campaign
- File infector Expiro hits US, steals FTP credentials
- First step in cross-platform Trojan bankers from Brazil done
- First widespread virus cross-infection
- Five charged in largest hacking scheme ever prosecuted in US
- Flame, Duqu and Stuxnet: in-depth code analysis of mssecmgr.ocx
- Flame: replication via Windows Update MITM proxy
- Flamer analysis: framework reconstruction
- Flamer: highly sophisticated and discreet threat targets the Middle East
- Flamer: urgent suicide
- Flashfake Mac OS X botnet confirmed
- Fortiguard: Android/Stiniter.A!tr
- From Georgia, with love Win32/Georbot
- From Sakura to Reveton via Smoke Bot - or a botnet distribution of Reveton
- Full analysis of Flame's Command & Control servers
- Full analysis of Flame's command & control servers
G
- Gamarue dropping Lethic bot
- GandCrab ransomware distributed by RIG and GrandSoft exploit kits
- Gangstaservice Winlock Affiliate
- Gauss: abnormal distribution
- Gauss: Nation-state cyber-surveillance meets banking Trojan
- Get gamed and rue the day...
- Getting more "personal" & deeper into Cridex with parfeit credential stealer infection
- Gimemo finally targeting USA with Camera Feature too
- Gimemo wants to play in the big league
- GingerMaster Android Malware Utilizing A Root Exploit
- Going solo: self-propagating ZBOT malware spotted
- Google Groups trojan
- Got malware? Rent an exploit service
- Gumblar Google-poisoning attack morphs
- Guys behind Gauss and Flame are the same
H
- Hackers are increasingly targeting IoT Devices with Mirai DDoS Malware
- Hammertoss: stealthy tactics define a Russian cyber threat group
- HARMUR: storing and analyzing historic data on malicious domains
- Harnig botnet: a retreating army
- Harnig is back
- Harvesting data on the Xarvester botmaster
- Have we seen the end of the ZeroAccess botnet?
- Hello Neutrino ! (just one more Exploit Kit)
- Herpes botnet
- HerpesNet botnet 1.7
- Hesperbot – A new, advanced banking trojan in the wild
- Hiding in plain sight: the FAKEM remote access trojan
- Hiloti: the (bot)master of disguise
- Hodprot: hot to bot
- How Lockergoga took down Hydro — ransomware used in targeted attacks aimed at big business
- How to steal a Botnet and what can happen when you do
- HTran and the Advanced Persistent Threat
- Hébergeurs malhonnêtes : nouvelle fermeture (3FN)
I
- IcoScript: using webmail to control malware
- Illuminating the Etumbot APT backdoor
- Industrial espionage and targeted attacks: understanding the characteristics of an escalating threat
- Infamous Skynet botnet author allegedly arrested
- Inside an APT campaign with multiple targets in India and Japan
- Inside Andromeda Bot v2.06 Webpanel / AKA Gamarue - Botnet Control Panel
- Inside Blackhole Exploits Kit v1.2.4 - Exploit Kit Control Panel
- Inside Carberp botnet
- Inside Citadel 1.3.4.5 C&C & Builder - Botnet Control Panel
- Inside Impact exploit kit
- Inside Pony 1.7 / Fareit C&C - Botnet Control Panel
- Inside Smoke Bot - botnet control panel
- Inside Smoke Bot - Botnet Control Panel
- Inside Styx exploit kit control panel
- Inside the Grum botnet
- Inside the world of the Citadel trojan
- Inside Ulocker
- Inside Upas Kit (1.0.1.1) aka Rombrast C&C - Botnet Control Panel
- Inside view of Lyposit aka (for its friends) Lucky LOCKER
- Insights from the analysis of the Mariposa botnet
- Insights into Win32/Bradop
- Interconnection of Gauss with Stuxnet, Duqu & Flame
- International cyber ring that infected millions of computers dismantled
- Internet Census 2012, port scanning /0 using insecure embedded devices
- Introducing Ponmocup-Finder
- IRC bot for Android
- It’s 2012 and Armageddon has arrived
- It’s not the end of the world: DarkComet misses by a mile
J
K
- Kaptoxa point-of-sale compromise
- Karagny.L unpack
- Kaspersky Lab et Seculert annoncent la récente découverte de « Madi », une nouvelle attaque de cyberespionnage au Moyen‑Orient
- Kaspersky security bulletin 2015. Overall statistics for 2015
- Kelihos back in town using Fast Flux
- Kelihos botnet appears again with new variant
- Kelihos botnet trying to expand by harnessing Russian national sentiments
- Kelihos is dead. Long live Kelihos
- Kelihos is dead… No wait… Long live Kelihos! Again!
- Kelihos/Hlux botnet returns with new techniques
- Kelihos: not alien resurrection, more attack of the clones
- King of spam:Festi botnet analysis
- Know your enemy: tracking botnets
- Koobface botnet master KrotReal back in business, distributes ransomware and promotes BHSEO service/product
- Koobface, un écosystème cybercriminel ou le conte des Mille et une nuits ?
- Kore exploit kit
- Kraken botnet infiltration
L
- Large-scale analysis of malware downloaders
- Latest Kelihos botnet shut down live at RSA Conference 2013
- Latest SpyEye botnet active and cheaper
- Latin American banks under fire from the Mexican VOlk-botnet
- Le dropper de CTB-Locker
- Learning stateful models for network honeypots
- Legal implications of countering botnets
- Leouncia - Yet another backdoor
- Leouncia - Yet another backdoor - Part 2
- Library file in certain Android apps connects to C&C servers
- Lifting the lid on the Redkit exploit kit (Part 1)
- Lights Out: Dragonfly is on the move
- Linux/Cdorked.A: New Apache backdoor being used in the wild to serve Blackhole
- Live Coronavirus Map Used to Spread Malware
- Locky Ransomware switches to the Lukitus extension for Encrypted Files
- LogPOS - new point of sale malware using mailslots
- Long life to Kelihos!
- Look what I found: it's a Pony!
M
- Maazben: best of both worlds
- Mac BackDoor.Wirenet.1 config extractor
- Mac Flashback exploiting unpatched Java vulnerability
- Mac spyware found at Oslo Freedom Forum
- Madi is back - New Tricks and a new Command&Control server
- Mahdi malware finds 150 new targets including U.S. and Germany, gets more evasive
- Major shift in strategy for ZeroAccess rootkit malware, as it shifts to user-mode
- Malicious Apache module injects Iframes
- Malicious Apache module used for content injection: Linux/Chapro.A
- Malware 2 - from infection to persistence
- Malware analysis of the Lurk downloader
- Malware analysis Rannoh/Matsnu
- Malware analysis tutorial 32: exploration of botnet client
- Malware attacking POS systems
- Malware discovered developed with Google's "Go" programming language
- Malware evolving to defeat anti-DDoS services like CloudFlare?
- Malware for everyone - Aldi Bot at a discount price
- Malware hunting with the Sysinternals tools
- Malware Memory Analysis - Volatility
- Malware pandemics
- Malware targeting Windows 8 uses Google Docs
- Malware Uses Google Go Language
- Mariposa botnet 'mastermind' jailed in Slovenia
- Massive Drop in number of active Zeus C&C servers
- Massive search fraud botnet seized by Microsoft and Symantec
- Mastermind behind Gozi bank malware charged along with two others
- McAfee Labs threat advisory : W32.Pinkslipbot
- MDK: the largest mobile botnet in China
- Measuring and detecting Fast-Flux service networks
- Measuring and detecting malware downloads in live network traffic
- Measuring botnet populations
- Meet "Red Dot exploit toolkit"
- Meet CritXPack (Previously Vintage Pack)
- Meet ProPack Exploit Pack - yes that's a lot of pack
- Meet ‘Flame’, the massive spy malware infiltrating Iranian computers
- Members of the largest criminal group engaged in online banking fraud are detained
- Mexican Twitter-controlled botnet unpicked
- Microsoft and financial services industry leaders target cybercriminal operations from ZeuS botnets
- Microsoft and Symantec take down Bamital botnet that hijacks online searches
- Microsoft disrupts the emerging Nitol botnet being spread through an unsecure supply chain
- Microsoft neutralizes Kelihos botnet, names defendant in case
- Microsoft partners with Interpol, industry to disrupt global malware attack affecting more than 770,000 PCs in past six months
- Microsoft security updates January 2016
- Miniduke
- MMD-0056-2016 - Linux/Mirai, how an old ELF malcode is recycled
- Mocbot spam analysis
- Monkif botnet hides commands in JPEGs
- More details of the Dorifel servers