Semantic search

Jump to navigation Jump to search
 AuthorEditorBotnet
Emerging attack vectors - RSA slide deckEd Skoudis
Etude sur le fonctionnement du Trojan.Matsnu.1 codant les données des utilisateursDr.WebRannoh
Exploring the market for stolen passwordsBrian KrebsBrian KrebsAndromeda
Citadel
FAQ on Kelihos.B/Hlux.B sinkholingDavid DittrichThe Honeynet ProjectKelihos
Fake FBI Ransomware analysisHynek BlinkaAVGReveton
Fast look at an infection by a Blackhole Exploit Kit 2.0Kafeine
Festi botnet analysis & investigationAleksandr Matrosov
Eugene Rodionov
ESETFesti
Flame, Duqu and Stuxnet: in-depth code analysis of mssecmgr.ocxAleksandr Matrosov
Eugene Rodionov
ESETDuqu
Flame
Stuxnet
Flame: replication via Windows Update MITM proxyAleksKaspersky labFlame
Flamer analysis: framework reconstructionAleksandr Matrosov
Eugene Rodionov
ESETFlame
Flamer: highly sophisticated and discreet threat targets the Middle EastSymantecFlame
Flamer: urgent suicideSymantecFlame
Flashfake Mac OS X botnet confirmedIgor SoumenkovKaspersky labFlashback
Fortiguard: Android/Stiniter.A!trFortinet
From Georgia, with love Win32/GeorbotESET
From Sakura to Reveton via Smoke Bot - or a botnet distribution of RevetonKafeineSmoke Bot
Reveton
Full analysis of Flame's Command & Control serversGReATKaspersky labFlame
Full analysis of Flame's command & control serversGReATKaspersky labFlame
Gangstaservice Winlock AffiliateXylitolXyliboxCasier
Gauss: Nation-state cyber-surveillance meets banking TrojanGReATKaspersky labFlame
Gauss
Stuxnet
Gauss: abnormal distributionGReATKaspersky labGauss
Get gamed and rue the day...Methusela Cebrian FerrerMicrosoftAndromeda
Getting more "personal" & deeper into Cridex with parfeit credential stealer infectionHendrik AdrianCridex
Gimemo finally targeting USA with Camera Feature tooKafeineGimemo
Gimemo wants to play in the big leagueKafeineGimemo
Guys behind Gauss and Flame are the sameAli IslamFireEyeFlame
Gauss
Harvesting data on the Xarvester botmasterBrian KrebsBrian KrebsSrizbi
Xarvester
HerpesNet botnet 1.7Lycroft EugeniaToolzwareHerpesNet
IRC bot for AndroidDenis MaslennikovKaspersky lab
Industrial espionage and targeted attacks: understanding the characteristics of an escalating threatOlivier Thonnard
Gavin O’Gorman
Leyla Bilge
Seán Kiernan
Martin Lee
RAID 2012Nitro
Sykipot
Taidoor
Stuxnet
Hydraq
Inside Andromeda Bot v2.06 Webpanel / AKA Gamarue - Botnet Control PanelKafeineAndromeda
Inside Blackhole Exploits Kit v1.2.4 - Exploit Kit Control PanelKafeine
Inside Citadel 1.3.4.5 C&C & Builder - Botnet Control PanelKafeineCitadel
Inside Impact exploit kitKafeineKafeine
Inside Pony 1.7 / Fareit C&C - Botnet Control PanelKafeineMalware don't need cofeePony
Inside Smoke Bot - Botnet Control PanelKafeineSmoke Bot
Inside Smoke Bot - botnet control panelKafeineSmoke Bot
Inside UlockerXylitolULocker
Inside Upas Kit (1.0.1.1) aka Rombrast C&C - Botnet Control PanelKafeineBlogspotUpas
Inside an APT campaign with multiple targets in India and JapanTrend Micro
Inside the Grum botnetBrian KrebsBrian KrebsGrum
Inside view of Lyposit aka (for its friends) Lucky LOCKERKafeineLyposit
Insights into Win32/BradopMicrosoftBradop
Interconnection of Gauss with Stuxnet, Duqu & FlameEugene RodionovESETDuqu
Flame
Gauss
Stuxnet
Introducing Ponmocup-FinderTom UPonmocup
It’s 2012 and Armageddon has arrivedJeff EdwardsArbor SERT
It’s not the end of the world: DarkComet misses by a mileJeff EdwardsArbor NetworksDarkComet
Java Runtime Environment 1.7 Zero-Day Exploit Delivers BackdoorManuel GatbuntonTrend Labs
Java Zero-Days and the Blackhole Exploit KitJon OliverTrend Micro
Joint strike force against DorifelSurfRightDorifel