Category:Publications
Jump to navigation
Jump to search
(previous page) (next page)
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.
This category uses the form Publication.
Pages in category "Publications"
The following 200 pages are in this category, out of 789 total.
(previous page) (next page)M
- More Flame/Skywiper CNC behavior uncovered
- Morto worm sets a (DNS) record
- MoVP 1.3 Desktops, heaps, and ransomware
- MP-DDoser: A rapidly improving DDoS threat
- MP-DDoser:Monitoring a rapidly improving DDoS threat
- Mpack installs ultra-invisible trojan
- MSIE 0-day exploit CVE-2014-0322 - Possibly targeting French aerospace association
- MSRT April 2012: Win32/Claretore
- MSRT April 2014 – Ramdo
- MSRT June '12 - cleanup on aisle one
- MSRT March 2012: breaking bad
- MSRT march: three hioles in one
- MSRT November '12 - Weelsof around the world
- MSRT September '12 - Medfos, hijacking your daily search
- Multitenancy Botnets thwart threat analysis
- Mysterious Avatar rootkit with API, SDK, and Yahoo Groups for C&C communication
N
- NASK shuts down dangerous Virut botnet domains
- Necurs Quick Analysis
- Neosploit gets Java 0-Day
- Nepalese government websites compromised to serve Zegost RAT
- NetTraveler APT gets a makeover for 10th birthday
- NetTraveler is back: the 'Red Star' APT returns with new tricks
- New Apple Mac trojan called OSX/Crisis discovered
- New Chinese exploit pack
- New crimeware attacks LatAm bank users
- New crypto-ransomware emerge in the wild
- New crypto-ransomware JIGSAW plays nasty games
- New CryptoLocker spreads via removable drives
- New Duqu sample found in the wild
- New GamaPoS malware piggybacks on Andromeda botnet; spreads in 13 US states
- New IceIX (ZeuS variant) changes its encryption method (again)
- New IE Zero-Day used in targeted attacks
- New Mac malware discovered on attendee computer at anti-surveillance workshop
- New Mahdi updates, new C2 server
- New point-of-sale malware distributed by Andromeda botnet
- New POS malware emerges - Punkey
- New PoS malware “Backoff” targets US
- New ransomware plays its victims an audio file, over and over and over…
- New RATs emerge from leaked Njw0rm source code
- New Thor botnet nearly ready to be sold, price $8,000
- New trojan found: Admin.HLP leaks organizations data
- New virus SMSZombie.A discovered by TrustGo Security Labs
- New Xtreme RAT attacks US, Israel, and other foreign governments
- Newly detected Crisis virus infects Windows, Macs and virtual machines
- Newly launched ‘HTTP-based botnet setup as a service’ empowers novice cybercriminals with bulletproof hosting capabilities
- NewPosThings has new PoS things
- NGRBot spreads via chat
- Ngrbot steals information and mine Bitcoins
- NitlovePOS: another new POS malware
- Nitol DDoS botnet discovered in China
- NjRAT & H-Worm variant infections continue to rise
- Not just a one-trick PonyDOS
- Now you Z-(eus) it, now you don’t: ZeuS bots silently upgraded to Citadel
- Nuevo botnet contra Mexico: Karn!v0r3x
- Nymaim - obfuscation chronicles
O
- Obama order sped up wave of cyberattacks against Iran
- Olmasco bootkit: next circle of TDL4 evolution (or not)
- On botnets that use DNS for command and control
- On the analysis of the ZeuS botnet crimeware toolkit
- One bot to rule them all
- One Sinowal trojan + one gang = hundreds of thousands of compromised accountS
- One-man PoS malware operation captures 22,000 credit card details in Brazil
- Operation Bot Roast II
- Operation SnowMan: DeputyDog actor compromises US veterans of foreign wars website
- Operation Socialist The Inside Story Of How British Spies Hacked Belgium’s Largest Telco
- OphionLocker: Joining in the Ransomware Race
- OSX Kitmos analysis
- OSX.iService its not going to iWork for you
- OSX.Iservice technical details
- OSX/Crisis has been used as part of a targeted attack
- OSX/Flashback - The first malware to infect hundreds of thousands of Apple Mac
- Over 9 million PCs infected - ZeroAccess botnet uncovered
- Overcoming reputation and proof-of-work systems in botnets
- Overview: inside the ZeuS trojan’s source code
- Owning Kraken zombies
P
- P2P botnet Kelihos.B with 100.000 nodes sinkholed
- Panda Security uncovers bot-killing malware
- Panel Gendarmerie
- Panel Supern0va et virus gendarmerie
- Panel Virus Gendarmerie : Ratio 0.36%
- Part virus, part botnet, spreading fast: Ramnit moves past Facebook passwords
- Peer-to-peer botnets: overview and case study
- PeerRush: mining for unwanted P2P traffic
- PETYA crypto-ransomware overwrites MBR to lock users out of their computers
- Petya ransomware skips the files and encrypts your hard drive instead
- Pitou, The “silent” resurrection of the PITOU notorious Srizbi kernel spambot
- Playing cops & robbers with banks & browsers
- PlugX malware: A good hacker is an apologetic hacker
- PlugX: new tool for a not so new campaign
- PlugX: some uncovered points
- Poison Ivy 2.3.0 Documentation
- Poison Ivy: assessing damage and extracting intelligence
- Poisoned search results: How hackers have automated search engine poisoning attacks to distribute malware
- PoisonIvy adapts to communicate through authentication proxies
- PokerAgent botnet stealing over 16,000 Facebook credentials
- Police Trojan crosses the Atlantic, now targets USA and Canada
- Ponmocup analysis
- PoS RAM scraper malware; past, present and future
- Post-mortem of a zombie: Conficker cleanup after six years
- Pramro and Sality - two PEs in a pod
- Proactive detection of network security incidents
- Proactive detection of security incidents II - Honeypots
- Proactive policy measures by Internet service providers against Botnets
- Probing the Gozi-Prinimalka campaign
- Pushdo botnet gets DGA update, over 6,000 machines host new variant
Q
R
- Ramnit goes social
- Ransom.II - UGC payment for USA - Windows Genuine impersonation for DE
- Ransomware : la sulfureuse hypothèse sur la situation chez Norsk Hydro
- Ransomware : Smile you're on camera - Reveton.C new landing pages
- Ransomware and Silence Locker control panel
- Ransomware Casier - Sharing Design with Lyposit - Gaelic & Persian (
- Ransomware crimeware kits
- Ransomware Fake Microsoft Security Essentials
- Ransomware gets professional, targeting Switzerland, Germany and Austria
- Ransomware or Wiper? LockerGoga Straddles the Line
- Ransomware report: the rise of BandarChor
- Ransomware « Trojan.Casier » Panel
- Ransomware ‘Holds Up’ victims
- Ransomware: playing on your fears
- Redkit - one account = one color
- Redkit : No more money ! Traffic US, CA, GB, AU
- Relentless Zbot and anti-emulations
- Research Win32/Slenfbot
- Researchers: Bredolab still lurking, though severely injured
- Reversing Andromeda-Gamarue botnet
- Reversing malware loaders - The Matsnu-A Case
- Reversing the wrath of Khan
- Reveton += HU, LV, SK, SI, TR (!), RO - So spreading accross Europe with 6 new Design
- Reveton Autumn Collection += AU,CZ, IE, NO & 17 new design
- Reveton can speak now !
- REVETON Ransomware Spreads with Old Tactics, New Infection Method
- Reveton.A
- REvil ransomware gang's web sites mysteriously shut down
- Richard Clarke on who was behind the Stuxnet attack
- RIG exploit kit strikes oil
- Rmnet.12 created a million Windows computer botnet
- RootSmart Android malware
- RootSmart malware utilizes GingerBreak root exploit
- Rovnix bootkit framework updated
- Rovnix Reloaded: new step of evolution
- Rovnix.D: the code injection story
- Russian service online to check the detection of malware
- Réflexions pour un plan d'action contre les botnets
S
- SamSam ransomware designed to inundate targeted networks with thousands of copies of itself
- SamSam Ransomware Evolves Its Tactics Towards Targeting Whole Companies
- Saudi Aramco hit by computer virus
- Say hello to Tinba: world’s smallest trojan-banker
- Scareware locks down computer due to child porn and terrorism
- SDBot IRC botnet continues to make waves
- Secrets of the Comfoo masters
- Security alert: new Android malware - TigerBot - identified in alternative markets
- Security alert: new TGLoader Android malware utilizes the exploid root exploit
- Security alert: new variants of Legacy Native (LeNa) identified
- Security alert: SpamSoldier
- Security experts detected new Twitter-controlled botnet
- Security Response Android.Counterclank
- SGNET: a worldwide deployable framework to support the analysis of malware threat models
- Shamoon the wiper - copycats at work
- Shamoon the Wiper in details
- Shamoon the Wiper: further details (Part II)
- Shedding light on the NeoSploit Exploit Kit
- Shylock financial malware back 'with a vengeance'
- SIM-ple: mobile handsets are weak link in latest online banking fraud scheme
- Sinowal analysis (Windows 7, 32-bit)
- Sinowal: MBR rootkit never dies! (and it always brings some new clever features)
- Sinowal: the evolution of MBR rootkit continues
- SIRv12
- SIRv12: the obstinacy of Conficker
- Skunkx DDoS bot analysis
- Skynet, a Tor-powered botnet straight from Reddit
- SKyWIper: A complex malware for targeted attacks
- Smartcard vulnerabilities in modern banking malware
- Social networks – A bonanza for cybercriminals
- Sony PlayStation's site SQL injected, redirecting to rogue security software
- Sony/Destover: mystery North Korean actor’s destructive and past network activity
- Sopelka Botnet: three banking trojans and one banking panel
- Source Code for IoT Botnet ‘Mirai’ Released
- Spam botnets: The fall of Grum and the rise of Festi
- Spambot evolution 2011
- SPL exploit kit – now with CVE-2013-0422
- Spread of Darkness...Details on the public release of the Darkness DDoS bot
- SpyEye being kicked to the curb by its customers?
- Stamp EK (aka SofosFO) now showing "Blackhole 2.0 Like" landing pages
- Static analysis of Dalvik bytecode and reflection in Android
- Stealing money from ATMs with malware
- Stealthy peer-to-peer C&C over SMB pipes
- Stealthy router-based botnet worm squirming
- Step-by-step reverse engineering malware: ZeroAccess / Max++ / Smiscer crimeware rootkit
- Stolen passwords allowed hackers to steal over one billion rubles
- Study of malware obfuscation techniques
- Survey on network-based botnet detection methods
- Symantec/Android.Ackposts
- Symantec/Android.Maistealer
- Symantec/Backdoor.Arcomrat
- Symantec/W32.Zorenium