Property:Editor
From Botnets.fr
Jump to navigation
Jump to search
This is a property of type
Page
. Default form:
Editor
.
Usage
715
previous 100
20
50
100
250
500
next 100
Filter
<p>The <a target="_blank" rel="nofollow noreferrer noopener" class="external text" href="https://www.semantic-mediawiki.org/wiki/Help:Property_page/Filter">search filter</a> allows the inclusion of <a target="_blank" rel="nofollow noreferrer noopener" class="external text" href="https://www.semantic-mediawiki.org/wiki/Help:Query_expressions">query expressions</a> such as <code>~</code> or <code>!</code>. The selected <a target="_blank" rel="nofollow noreferrer noopener" class="external text" href="https://www.semantic-mediawiki.org/wiki/Query_engine">query engine</a> might also support case insensitive matching or other short expressions like:</p><ul><li><code>in:</code> result should include the term, e.g. '<code>in:Foo</code>'</li></ul><ul><li><code>not:</code> result should to not include the term, e.g. '<code>not:Bar</code>'</li></ul>
Showing 100 pages using this property.
"
"Crypto Ransomware" CTB-Locker (Critroni.A) on the rise
+
Kafeine
+
"NetTraveler is Running!" - Red Star APT attacks compromise high-profile victims
+
Kaspersky lab
+
"njRAT" Uncovered
+
Fidelis cybersecurity
+
'
'Tigger' trojan keeps security researchers hopping
+
UBM TechWeb
+
A
A DDoS family affair: Dirt Jumper bot family continues to evolve
+
Arbor SERT
+
A Foray into Conficker’s Logic and Rendezvous Points
+
LEET'09 Proceedings of the 2nd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more
+
A ScarePakage variant is targeting more countries : impersonating Europol and AFP
+
Kafeine
+
A case study on Storm worm
+
Usenix
+
A chat with NGR Bot
+
InfoSec Institude
+
A new iteration of the TDSS/TDL-4 malware using DGA-based command and control
+
Damballa
+
A peek inside the Darkness (Optima) DDoS Bot
+
Webroot
+
A peek inside the PickPocket botnet
+
Webroot
+
A quick update on spambot Kelihos
+
Abuse.ch
+
A study of the Ilomo / Clampi botnet
+
Trend Micro
+
A study on botnet detection techniques
+
International Journal of Scientific and Research Publications
+
APT1: technical backstage
+
Malware.lu
+
AbaddonPOS: A new point of sale threat linked to Vawtrak
+
Proofpoint
+
Acquisition and analysis of volatile memory from Android devices
+
Elsevier
+
Actually, my name is Duqu - Stuxnet is my middle name
+
BAE Systems stratsec
+
Adobe Flash Player 0-day and HackingTeam's Remote Control System
+
Kaspersky lab
+
Adrenalin botnet. The trend marks the Russian crimeware
+
Evilfingers
+
Advancing the fight against botnets with consumer notifications
+
Microsoft
+
Aldi Bot - bka.de DDoS
+
Youtube
+
Alina: casting a shadow on POS
+
Trustwave
+
Alina: following the shadow part 1
+
Trustwave
+
Alina: following the shadow part 2
+
Trustwave
+
All-in-one malware: an overview of Sality
+
Symantec
+
An Analysis of the iKeeB (duh) iPhone botnet (Worm)
+
SRI International
+
An advanced hybrid peer-to-peer botnet
+
School of Electrical Engineering and Computer Science University of Central Florida
+
An analysis of Dorkbot’s infection vectors (part 2)
+
Microsoft Malware Protection Centre
+
An analysis of the cross-platform backdoor NetWeirdRC
+
Intego
+
An analysis of underground forums
+
Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference
+
An encounter with trojan Nap
+
FireEye
+
An evaluation of current and future botnet defences
+
Queensland University of Technology
+
An interesting case of JRE sandbox breach (CVE-2012-0507)
+
Microsoft
+
An internet census taken by an illegal botnet – A qualitative assessment of published measurements
+
SIGCOMM Computer Communication Review
+
An overnight sensation — CoreBot returns as a full-fledged financial malware
+
Security Intelligence
+
An overview of exploit packs
+
Contagio
+
An overview of messaging botnets
+
McAfee
+
Analyse de Xtreme RAT
+
Malware.lu
+
Analyse et poncage du botnet HerpesNet
+
Malware.lu
+
Analyse of the sample cdorked.A
+
Malware.lu
+
Analyse statique de Duqu stage 1
+
Malware.lu
+
Analyse statique de Duqu stage 2
+
Malware.lu
+
Analysis of DarkMegi aka NpcDark
+
StopMalvertising
+
Analysis of TDL4
+
BAE Systems
+
Analysis of Ysreef (a variant of Tobfy)
+
Malware.lu
+
Analysis of a PlugX malware variant used for targeted attacks
+
CIRCL
+
Analysis of a VBScript bot
+
Zscaler
+
Analysis of a stage 3 Miniduke malware sample
+
CIRCL
+
Analysis of functions used to encode strings in Flame (GDB script)
+
Malware.lu
+
Analysis of ngrBot
+
StopMalvertising
+
Analysis of the Finfisher lawful interception malware
+
Rapid7
+
Analysis of the malware of Red October - Part 1
+
Malware.lu
+
Analysis of the malware of Red October - Part 2
+
Malware.lu
+
Analyzing a new exploit pack
+
Kahu Security
+
Anaru malware now live and ready to steal
+
Symantec
+
And real name of Magnitude is....
+
Kafeine
+
Android Marcher now marching via porn sites
+
Zscaler
+
Android RATs branch out with Dendroid
+
Symantec
+
Android malware pairs man-in-the-middle with remote-controlled banking trojan
+
McAfee Labs
+
Android trojan used to create simple SMS spam botnet
+
Cloudmark
+
Android.Bmaster: A million-dollar mobile botnet
+
Symantec
+
Android.Counterclank found in official Android market
+
Symantec
+
Andromeda 2.7 features
+
Fortinet
+
Angler Exploit Kit – Operating at the Cutting Edge
+
Websense
+
Anonymous supporters tricked into installing ZeuS trojan
+
Symantec
+
Another family of DDoS bots: Avzhan
+
Arbor Networks
+
Anunak:APT against financial institutions
+
Fox-IT
+
Análisis del comportamiento de VOlk y sus funcionalidades
+
ESET
+
Apache binary backdoors on Cpanel-based servers
+
Sucuri
+
Apple releases Java update; includes fix for vulnerability exploited by Flashback malware
+
Intego
+
Apple took 3 years to fix Finfisher trojan hole
+
Brian Krebs
+
Apple zombie malware 'NetWeird' rummages for browser and email passwords
+
Sophos Labs
+
Armenian Bredolab creator jailed for computer sabotage
+
Kaspersky lab
+
Attack on Zygote: a new twist in the evolution of mobile threats
+
Kaspersky Securelist
+
Attackers place Command and Control servers inside enterprise walls
+
Security Week
+
Attention! All data on your hardrive is encrypted
+
AVG
+
AutoIT ransomware
+
Malware.lu
+
Avalanche phishers migrate to ZeuS
+
Bankinfo security
+
Avatar rootkit: the continuing saga
+
ESET Welivesecurity
+
B
Back to Stuxnet: the missing link
+
Kaspersky lab
+
Backdoor uses Evernote as command and control server
+
Trend Micro
+
Banking trojan Dridex uses macros for infection
+
Trend Micro
+
BareBox: efficient malware analysis on bare-metal
+
Annual Computer Security Applications Conference
+
Battling the Rustock threat
+
Microsoft
+
Battling the Zbot threat
+
Microsoft
+
Bitcrypt broken
+
Cassidian Cybersecurity
+
Black Dragon: "... and all will burn beneath the shadow of my wings"
+
Malwageddon
+
BlackEnergy competitor – The 'Darkness' DDoS bot
+
Shadowserver Foundation
+
Blackhole and Cool Exploit kits nearly extinct
+
Threatpost
+
Blackhole exploit kit v2 on the rise
+
Zscaler
+
Blackhole, CVE-2012-0507 and Carberp
+
ESET
+
Bleeding Life Exploit Pack
+
Kahu Security
+
Bot Roast II nets 8 individuals
+
FBI National press office
+
Bot herders build newer versions of previous botnet Waledac
+
SPAMfighter
+
Bot shopping with my wife
+
Panda Labs
+
BoteAR: a “social botnet”- What are we talking about
+
Kaspersky lab
+
Botnet command server hidden in Tor
+
GData
+
Botnet operation disabled
+
FBI
+
Navigation menu
Personal tools
Log in
Namespaces
Property
Discussion
Variants
Views
Read
View source
View history
More
Search
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Tools
What links here
Related changes
Upload file
Special pages
Printable version
Permanent link
Page information
Browse properties