Semantic search

Jump to navigation Jump to search
 AuthorEditorBotnet
"NetTraveler is Running!" - Red Star APT attacks compromise high-profile victimsGReATKaspersky labNetTraveler
"njRAT" UncoveredFidelisFidelis cybersecurityNjRAT
APT1: technical backstageMalware.lu
Paul Rascagnères
Malware.luFakeM
Poison Ivy
Adobe Flash Player 0-day and HackingTeam's Remote Control SystemSergey GolovanovKaspersky lab
Alina: casting a shadow on POSJosh GrunzweigTrustwaveAlina
VSkimmer
BlackPOS
Alina: following the shadow part 1Josh GrunzweigTrustwaveAlina
Alina: following the shadow part 2Josh GrunzweigTrustwaveAlina
An encounter with trojan NapAli Islam
Abhishek Singh
FireEyeKelihos
An overview of messaging botnetsFrançois PagetMcAfeeCutwail
Bagle
Bobax
Kraken
Pushdo
Donbot
Festi
Fivetoone
Grum
Kelihos
Lethic
Maazben
Rustock
Waledac
Slenfbot
Darkmailer
Analyse of the sample cdorked.AJvoisinMalware.lu
Analysis of a PlugX malware variant used for targeted attacksCIRCLCIRCLPlugX
Analysis of a stage 3 Miniduke malware sampleCIRCLMiniDuke
Analysis of the malware of Red October - Part 1RootBSD
Malware.lu
Malware.luRocra
Analysis of the malware of Red October - Part 2RootBSD
Malware.lu
Malware.luRocra
Apache binary backdoors on Cpanel-based serversDaniel CidSucuri
Attention! All data on your hardrive is encryptedTomas Prochazka
Michal Cebak
AVGRannoh
Avatar rootkit: the continuing sagaAleksandr Matrosov
Eugene Rodionov
Anton Cherepanov
ESET WelivesecurityAvatar
Backdoor uses Evernote as command and control serverNikko TamañaTrend MicroVernot
Black Dragon: "... and all will burn beneath the shadow of my wings"MalwageddonMalwageddon
Blackhole and Cool Exploit kits nearly extinctDennis FisherThreatpostCutwail
Reveton