Long pages
Jump to navigation
Jump to search
Showing below up to 500 results in range #1 to #500.
View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)
- (hist) Citadel ZeuS bot [11,251 bytes]
- (hist) Main Page [10,026 bytes]
- (hist) Department of Justice takes action to disable international botnet [8,570 bytes]
- (hist) W32.Duqu, the precursor to the next Stuxnet [8,358 bytes]
- (hist) Bot Roast II nets 8 individuals [8,278 bytes]
- (hist) Coordinated DDoS attack during Russian Duma elections [7,490 bytes]
- (hist) Proactive detection of network security incidents [6,420 bytes]
- (hist) Proactive detection of security incidents II - Honeypots [5,632 bytes]
- (hist) PoS RAM scraper malware; past, present and future [4,741 bytes]
- (hist) Botnet operation disabled [4,644 bytes]
- (hist) Athena [4,104 bytes]
- (hist) Anunak:APT against financial institutions [4,067 bytes]
- (hist) Hiding in plain sight: the FAKEM remote access trojan [3,331 bytes]
- (hist) It’s 2012 and Armageddon has arrived [3,212 bytes]
- (hist) A study of the Ilomo / Clampi botnet [3,163 bytes]
- (hist) Duqu [3,136 bytes]
- (hist) Operation Bot Roast II [3,107 bytes]
- (hist) Police lock [2,959 bytes]
- (hist) Botnet [2,935 bytes]
- (hist) A new iteration of the TDSS/TDL-4 malware using DGA-based command and control [2,844 bytes]
- (hist) Ransom.II [2,828 bytes]
- (hist) Reversing malware loaders - The Matsnu-A Case [2,810 bytes]
- (hist) The real face of Koobface: the largest web 2.0 botnet explained [2,747 bytes]
- (hist) Urausy [2,736 bytes]
- (hist) MP-DDoser: A rapidly improving DDoS threat [2,645 bytes]
- (hist) The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet [2,581 bytes]
- (hist) Gauss: abnormal distribution [2,572 bytes]
- (hist) Unveiling the network criminal infrastructure of TDSS/TDL4 - DGAv14: a case study on a new TDSS/TDL4 variant [2,552 bytes]
- (hist) Microsoft and financial services industry leaders target cybercriminal operations from ZeuS botnets [2,547 bytes]
- (hist) BareBox: efficient malware analysis on bare-metal [2,472 bytes]
- (hist) AnnLoader [2,391 bytes]
- (hist) ZeuSbot/Spyeye P2P updated, fortifying the botnet [2,348 bytes]
- (hist) Tobfy [2,316 bytes]
- (hist) Combatting point-of-sale malware [2,285 bytes]
- (hist) Dorkbot: conquistando Latinoamérica [2,248 bytes]
- (hist) All-in-one malware: an overview of Sality [2,235 bytes]
- (hist) Not just a one-trick PonyDOS [2,192 bytes]
- (hist) Gimemo [2,168 bytes]
- (hist) The evolution of TDL: conquering x64 [2,158 bytes]
- (hist) Carberp - a modular information stealing trojan [2,146 bytes]
- (hist) Illuminating the Etumbot APT backdoor [2,141 bytes]
- (hist) Taking down botnets: Microsoft and the Rustock botnet [2,126 bytes]
- (hist) Malware pandemics [2,098 bytes]
- (hist) ULocker [2,081 bytes]
- (hist) Traffic direction systems as malware distribution tools [2,063 bytes]
- (hist) Discerning relationships: the Mexican botnet connection [2,050 bytes]
- (hist) Large-scale analysis of malware downloaders [2,018 bytes]
- (hist) Flashfake Mac OS X botnet confirmed [2,015 bytes]
- (hist) Ransom.EY [2,005 bytes]
- (hist) Android.Bmaster: A million-dollar mobile botnet [1,991 bytes]
- (hist) Dirt Jumper DDoS bot increasingly popular [1,966 bytes]
- (hist) Post-mortem of a zombie: Conficker cleanup after six years [1,964 bytes]
- (hist) Study of malware obfuscation techniques [1,944 bytes]
- (hist) W32.Stuxnet dossier [1,937 bytes]
- (hist) Measuring botnet populations [1,931 bytes]
- (hist) Zeroing in on malware propagation methods [1,925 bytes]
- (hist) How to steal a Botnet and what can happen when you do [1,925 bytes]
- (hist) Analysis of a “/0” stealth scan from a botnet [1,915 bytes]
- (hist) King of spam:Festi botnet analysis [1,909 bytes]
- (hist) Unveiling an Indian cyberattack infrastructure - a special report [1,905 bytes]
- (hist) Flamer: urgent suicide [1,894 bytes]
- (hist) Demystifying Pobelka [1,893 bytes]
- (hist) Dorkbot [1,880 bytes]
- (hist) W32.Shadesrat (Blackshades) author arrested [1,868 bytes]
- (hist) Citadel [1,867 bytes]
- (hist) Full analysis of Flame's Command & Control servers [1,864 bytes]
- (hist) DISCLOSURE: detecting botnet command and control servers through large-scale NetFlow analysis [1,850 bytes]
- (hist) Your botnet is my botnet: analysis of a botnet takeover [1,821 bytes]
- (hist) Xpaj Botnet intercepts up to 87 million searches per year [1,820 bytes]
- (hist) SIRv12 [1,803 bytes]
- (hist) Kelihos: not alien resurrection, more attack of the clones [1,797 bytes]
- (hist) Win32/Sality newest component: a router’s primary DNS changer named Win32/RBrute [1,795 bytes]
- (hist) Hiloti: the (bot)master of disguise [1,784 bytes]
- (hist) MSRT March 2012: breaking bad [1,777 bytes]
- (hist) Ransom.IF [1,777 bytes]
- (hist) Know your enemy: tracking botnets [1,765 bytes]
- (hist) Chasing cybercrime: network insights of Dyre and Dridex trojan bankers [1,761 bytes]
- (hist) The evolution of webinjects [1,753 bytes]
- (hist) The Madi campaign - Part II [1,751 bytes]
- (hist) Kelihos [1,742 bytes]
- (hist) Stealing money from ATMs with malware [1,736 bytes]
- (hist) Darkness [1,726 bytes]
- (hist) Waledac Botnet - Deployment and Communication Analysis [1,725 bytes]
- (hist) Gauss: Nation-state cyber-surveillance meets banking Trojan [1,716 bytes]
- (hist) W32.Qakbot in detail [1,715 bytes]
- (hist) The new era of botnets [1,698 bytes]
- (hist) Cracking down on botnets [1,695 bytes]
- (hist) CryptoDefense and How Decrypt ransomware information guide and FAQ [1,694 bytes]
- (hist) Case study of the Miner botnet [1,693 bytes]
- (hist) Android trojan used to create simple SMS spam botnet [1,671 bytes]
- (hist) BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection [1,667 bytes]
- (hist) Weelsof [1,659 bytes]
- (hist) SKyWIper: A complex malware for targeted attacks [1,649 bytes]
- (hist) Microsoft neutralizes Kelihos botnet, names defendant in case [1,636 bytes]
- (hist) The mystery of the Duqu framework [1,636 bytes]
- (hist) Playing cops & robbers with banks & browsers [1,635 bytes]
- (hist) An internet census taken by an illegal botnet – A qualitative assessment of published measurements [1,630 bytes]
- (hist) Another family of DDoS bots: Avzhan [1,625 bytes]
- (hist) HARMUR: storing and analyzing historic data on malicious domains [1,619 bytes]
- (hist) Reversing the wrath of Khan [1,613 bytes]
- (hist) Malware attacking POS systems [1,608 bytes]
- (hist) Tinba [1,604 bytes]
- (hist) W32.Xpaj.B: making easy money from complex code [1,603 bytes]
- (hist) Inside Carberp botnet [1,596 bytes]
- (hist) Kelihos is dead. Long live Kelihos [1,587 bytes]
- (hist) Attackers place Command and Control servers inside enterprise walls [1,570 bytes]
- (hist) Epubb [1,562 bytes]
- (hist) Collateral damage: Microsoft hits security researchers along with Citadel [1,555 bytes]
- (hist) Takeover of Virut domains [1,555 bytes]
- (hist) The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements [1,555 bytes]
- (hist) The ACCDFISA malware family – Ransomware targetting Windows servers [1,553 bytes]
- (hist) Analysis of the Finfisher lawful interception malware [1,550 bytes]
- (hist) SDBot IRC botnet continues to make waves [1,549 bytes]
- (hist) Botnet shutdown success story: how Kaspersky Lab disabled the Hlux/Kelihos botnet [1,543 bytes]
- (hist) Step-by-step reverse engineering malware: ZeroAccess / Max++ / Smiscer crimeware rootkit [1,543 bytes]
- (hist) One Sinowal trojan + one gang = hundreds of thousands of compromised accountS [1,529 bytes]
- (hist) Flame, Duqu and Stuxnet: in-depth code analysis of mssecmgr.ocx [1,526 bytes]
- (hist) Insights from the analysis of the Mariposa botnet [1,522 bytes]
- (hist) Android malware pairs man-in-the-middle with remote-controlled banking trojan [1,520 bytes]
- (hist) You dirty RAT! Part 1 – DarkComet [1,512 bytes]
- (hist) ‘Project Blitzkrieg’ promises more aggressive cyberheists against U.S. banks [1,507 bytes]
- (hist) Pitou, The “silent” resurrection of the PITOU notorious Srizbi kernel spambot [1,503 bytes]
- (hist) Industrial espionage and targeted attacks: understanding the characteristics of an escalating threat [1,495 bytes]
- (hist) Hodprot: hot to bot [1,491 bytes]
- (hist) Measuring and detecting malware downloads in live network traffic [1,490 bytes]
- (hist) Torpig - Back to the future or how the most sophisticated trojan in 2008 reinvents itself [1,489 bytes]
- (hist) XPAJ: reversing a Windows x64 bootkit [1,481 bytes]
- (hist) Guys behind Gauss and Flame are the same [1,480 bytes]
- (hist) The Flame: questions and answers [1,476 bytes]
- (hist) Rovnix Reloaded: new step of evolution [1,474 bytes]
- (hist) The ‘advertising’ botnet [1,461 bytes]
- (hist) Under the hood of Carberp: Malware & configuration analysis [1,461 bytes]
- (hist) How Lockergoga took down Hydro — ransomware used in targeted attacks aimed at big business [1,456 bytes]
- (hist) RootSmart Android malware [1,452 bytes]
- (hist) New IceIX (ZeuS variant) changes its encryption method (again) [1,451 bytes]
- (hist) Flamer: highly sophisticated and discreet threat targets the Middle East [1,450 bytes]
- (hist) The where and why of Hlux [1,448 bytes]
- (hist) Harnig botnet: a retreating army [1,431 bytes]
- (hist) Learning stateful models for network honeypots [1,430 bytes]
- (hist) Mehika [1,425 bytes]
- (hist) BlackEnergy competitor – The 'Darkness' DDoS bot [1,423 bytes]
- (hist) Spam botnets: The fall of Grum and the rise of Festi [1,421 bytes]
- (hist) Blackhole, CVE-2012-0507 and Carberp [1,419 bytes]
- (hist) An interesting case of JRE sandbox breach (CVE-2012-0507) [1,411 bytes]
- (hist) Why forums? An empirical analysis into the facilitating factors of carding forums [1,404 bytes]
- (hist) DGAs and cyber-criminals: a case study [1,403 bytes]
- (hist) Tilon/SpyEye2 intelligence report [1,402 bytes]
- (hist) New trojan found: Admin.HLP leaks organizations data [1,402 bytes]
- (hist) Warbot [1,398 bytes]
- (hist) A DDoS family affair: Dirt Jumper bot family continues to evolve [1,397 bytes]
- (hist) RIG exploit kit strikes oil [1,396 bytes]
- (hist) Richard Clarke on who was behind the Stuxnet attack [1,393 bytes]
- (hist) Peer-to-peer botnets: overview and case study [1,393 bytes]
- (hist) You can’t be invulnerable, but you can be well protected [1,392 bytes]
- (hist) Static analysis of Dalvik bytecode and reflection in Android [1,389 bytes]
- (hist) Meet ‘Flame’, the massive spy malware infiltrating Iranian computers [1,389 bytes]
- (hist) The Cridex trojan targets 137 financial organizations in one go [1,388 bytes]
- (hist) An advanced hybrid peer-to-peer botnet [1,374 bytes]
- (hist) Carberp-based trojan attacking SAP [1,370 bytes]
- (hist) Cyber gang seeks botmasters to wage massive wave of trojan attacks against U.S. banks [1,357 bytes]
- (hist) ZeuS [1,355 bytes]
- (hist) On the analysis of the ZeuS botnet crimeware toolkit [1,350 bytes]
- (hist) Acquisition and analysis of volatile memory from Android devices [1,348 bytes]
- (hist) Dutch users served Sinowal for lunch [1,345 bytes]
- (hist) BoteAR: a “social botnet”- What are we talking about [1,344 bytes]
- (hist) Detection and classification of different botnet C&C channels [1,344 bytes]
- (hist) Top 50 bad hosts & networks 2011 Q4 [1,343 bytes]
- (hist) Cutwail drives spike in malicious HTML attachment spam [1,341 bytes]
- (hist) Microsoft partners with Interpol, industry to disrupt global malware attack affecting more than 770,000 PCs in past six months [1,339 bytes]
- (hist) Win32/Gataka - or should we say Zutick? [1,338 bytes]
- (hist) ZeroAccess rootkit launched by signed installers [1,336 bytes]
- (hist) An evaluation of current and future botnet defences [1,334 bytes]
- (hist) Carberp [1,329 bytes]
- (hist) China targets macs used by NGOs [1,326 bytes]
- (hist) The ACCDFISA malware family – Ransomware targeting Windows servers [1,325 bytes]
- (hist) Kelihos botnet trying to expand by harnessing Russian national sentiments [1,320 bytes]
- (hist) "NetTraveler is Running!" - Red Star APT attacks compromise high-profile victims [1,318 bytes]
- (hist) Evolution of Win32Carberp: going deeper [1,313 bytes]
- (hist) SGNET: a worldwide deployable framework to support the analysis of malware threat models [1,312 bytes]
- (hist) A case study on Storm worm [1,311 bytes]
- (hist) The mystery of Duqu: part one [1,307 bytes]
- (hist) Cythosia [1,306 bytes]
- (hist) Kelihos back in town using Fast Flux [1,302 bytes]
- (hist) Inside the world of the Citadel trojan [1,299 bytes]
- (hist) Trojan on the loose: an in-depth analysis of police trojan [1,298 bytes]
- (hist) MiniDuke [1,296 bytes]
- (hist) Microsoft and Symantec take down Bamital botnet that hijacks online searches [1,294 bytes]
- (hist) Bredolab botmaster ‘Birdie’ still at large [1,294 bytes]
- (hist) SIM-ple: mobile handsets are weak link in latest online banking fraud scheme [1,294 bytes]
- (hist) Botnet shutdown success story - again: disabling the new Hlux/Kelihos botnet [1,293 bytes]
- (hist) TDSS botnet: full disclosure [1,286 bytes]
- (hist) YoYo [1,285 bytes]
- (hist) ZeuS ransomware feature: win unlock [1,284 bytes]
- (hist) Where Are They Today? Cybercrime Trojans That No One Misses: Shifu Malware [1,277 bytes]
- (hist) The ZeroAccess botnet: mining and fraud for massive financial gain [1,272 bytes]
- (hist) Newly detected Crisis virus infects Windows, Macs and virtual machines [1,272 bytes]
- (hist) FAQ on Kelihos.B/Hlux.B sinkholing [1,271 bytes]
- (hist) The mystery of Duqu: part six (the command and control servers) [1,270 bytes]
- (hist) The Sality botnet [1,269 bytes]
- (hist) New Thor botnet nearly ready to be sold, price $8,000 [1,267 bytes]
- (hist) You dirty RAT! part 2 – BlackShades NET [1,265 bytes]
- (hist) Cracking into the new P2P variant of Zeusbot/Spyeye [1,263 bytes]
- (hist) Say hello to Tinba: world’s smallest trojan-banker [1,262 bytes]
- (hist) Trojan.Taidoor takes aim at policy think tanks [1,261 bytes]
- (hist) Dorifel crypto malware paralyzes Dutch companies and public sector [1,256 bytes]
- (hist) Carberp gang evolution: CARO 2012 presentation [1,252 bytes]
- (hist) Dorifel virus gereed voor Nederlandse banking phishing [1,249 bytes]
- (hist) Réflexions pour un plan d'action contre les botnets [1,249 bytes]
- (hist) TDL3 : The rootkit of all evil [1,245 bytes]
- (hist) Panel Virus Gendarmerie : Ratio 0.36% [1,244 bytes]
- (hist) Banking trojan Dridex uses macros for infection [1,241 bytes]
- (hist) Carberp: it’s not over yet [1,240 bytes]
- (hist) Dorifel/Quervar: the support scammer’s secret weapon [1,238 bytes]
- (hist) Security alert: new variants of Legacy Native (LeNa) identified [1,237 bytes]
- (hist) Who's behind the world's largest spam botnet? [1,237 bytes]
- (hist) TDL4 reloaded: Purple Haze all in my brain [1,234 bytes]
- (hist) Mebromi [1,233 bytes]
- (hist) New Xtreme RAT attacks US, Israel, and other foreign governments [1,231 bytes]
- (hist) Malware Memory Analysis - Volatility [1,231 bytes]
- (hist) Got malware? Rent an exploit service [1,230 bytes]
- (hist) PeerRush: mining for unwanted P2P traffic [1,229 bytes]
- (hist) An analysis of underground forums [1,227 bytes]
- (hist) Doctor Web exposes 550 000 strong Mac botnet [1,227 bytes]
- (hist) Trojan.ZeroAccess infection analysis [1,227 bytes]
- (hist) 1940 IPs for a BHEK/ULocker server - Nexcess-Net [1,226 bytes]
- (hist) W32.Flamer: spreading mechanism tricks and exploits [1,223 bytes]
- (hist) Expiro [1,220 bytes]
- (hist) Legal implications of countering botnets [1,218 bytes]
- (hist) Unexpected reboot: Necurs [1,213 bytes]
- (hist) Win32/Gataka: a banking Trojan ready to take off [1,213 bytes]
- (hist) Targeted attacks and Ukraine [1,209 bytes]
- (hist) Rovnix.D: the code injection story [1,208 bytes]
- (hist) Anonymous supporters tricked into installing ZeuS trojan [1,201 bytes]
- (hist) SpyEye being kicked to the curb by its customers? [1,201 bytes]
- (hist) Devdar [1,195 bytes]
- (hist) Multitenancy Botnets thwart threat analysis [1,194 bytes]
- (hist) Ransomware gets professional, targeting Switzerland, Germany and Austria [1,194 bytes]
- (hist) The ZeroAccess botnet revealed [1,193 bytes]
- (hist) MSIE 0-day exploit CVE-2014-0322 - Possibly targeting French aerospace association [1,191 bytes]
- (hist) Smartcard vulnerabilities in modern banking malware [1,190 bytes]
- (hist) Flimrans [1,189 bytes]
- (hist) It’s not the end of the world: DarkComet misses by a mile [1,185 bytes]
- (hist) BotGrep: finding P2P bots with structured graph analysis [1,183 bytes]
- (hist) Nertra [1,183 bytes]
- (hist) TDL3 : Why so serious [1,178 bytes]
- (hist) Police Trojan crosses the Atlantic, now targets USA and Canada [1,177 bytes]
- (hist) Microsoft disrupts the emerging Nitol botnet being spread through an unsecure supply chain [1,171 bytes]
- (hist) Alebrije [1,171 bytes]
- (hist) DroidLive New SMS Android Trojan [1,170 bytes]
- (hist) Flamer analysis: framework reconstruction [1,168 bytes]
- (hist) Security alert: new TGLoader Android malware utilizes the exploid root exploit [1,166 bytes]
- (hist) Mirage [1,166 bytes]
- (hist) The mystery of Duqu: part three [1,164 bytes]
- (hist) Pramro and Sality - two PEs in a pod [1,164 bytes]
- (hist) The rise of TOR-based botnets [1,163 bytes]
- (hist) Obama order sped up wave of cyberattacks against Iran [1,163 bytes]
- (hist) Clampi/Ligats/Ilomo trojan [1,162 bytes]
- (hist) MSRT September '12 - Medfos, hijacking your daily search [1,159 bytes]
- (hist) A peek inside the Darkness (Optima) DDoS Bot [1,159 bytes]
- (hist) Ransomware and Silence Locker control panel [1,157 bytes]
- (hist) Srizbi [1,156 bytes]
- (hist) W32.Tinba (Tinybanker) The turkish incident [1,152 bytes]
- (hist) Long life to Kelihos! [1,149 bytes]
- (hist) Versatile and infectious: Win64/Expiro is a cross-platform file infector [1,148 bytes]
- (hist) From Georgia, with love Win32/Georbot [1,146 bytes]
- (hist) Duqu FAQ [1,146 bytes]
- (hist) Koobface [1,145 bytes]
- (hist) Trojan Nap aka Kelihos/Hlux - Feb. 2013 status update [1,144 bytes]
- (hist) NGRBot spreads via chat [1,141 bytes]
- (hist) NetTraveler is back: the 'Red Star' APT returns with new tricks [1,139 bytes]
- (hist) Petya ransomware skips the files and encrypts your hard drive instead [1,135 bytes]
- (hist) Casier [1,135 bytes]
- (hist) Vawtrak gains momentum and expands targets [1,135 bytes]
- (hist) The lifecycle of peer-to-peer (Gameover) ZeuS [1,134 bytes]
- (hist) Back to Stuxnet: the missing link [1,133 bytes]
- (hist) An Analysis of the iKeeB (duh) iPhone botnet (Worm) [1,128 bytes]
- (hist) Torpig [1,126 bytes]
- (hist) Adobe Flash Player 0-day and HackingTeam's Remote Control System [1,124 bytes]
- (hist) Carberp-in-the-Mobile [1,123 bytes]
- (hist) Watch out for CoreBot, new stealer in the wild [1,122 bytes]
- (hist) Domain generation algorithms (DGA) in stealthy malware [1,121 bytes]
- (hist) Sobig [1,121 bytes]
- (hist) Newly launched ‘HTTP-based botnet setup as a service’ empowers novice cybercriminals with bulletproof hosting capabilities [1,117 bytes]
- (hist) Covert channels over social networks [1,116 bytes]
- (hist) Malware evolving to defeat anti-DDoS services like CloudFlare? [1,116 bytes]
- (hist) Survey on network-based botnet detection methods [1,115 bytes]
- (hist) Win32/Gataka banking Trojan - Detailed analysis [1,114 bytes]
- (hist) Miniduke [1,113 bytes]
- (hist) Full analysis of Flame's command & control servers [1,113 bytes]
- (hist) Disttrack sabotage malware wipes data at unnamed Middle East energy organization [1,113 bytes]
- (hist) Hesperbot [1,112 bytes]
- (hist) Measuring and detecting Fast-Flux service networks [1,112 bytes]
- (hist) TR-24 analysis - Destory RAT family [1,109 bytes]
- (hist) Tales from Crisis, Chapter 3: The Italian rootkit job [1,106 bytes]
- (hist) Carbanak/Anunak in the BlueCoat malware analysis appliance [1,105 bytes]
- (hist) Coreflood [1,105 bytes]
- (hist) Solar [1,104 bytes]
- (hist) PickPocket [1,102 bytes]
- (hist) Operation SnowMan: DeputyDog actor compromises US veterans of foreign wars website [1,099 bytes]
- (hist) Reversing Andromeda-Gamarue botnet [1,099 bytes]
- (hist) Digging into the Nitol DDoS botnet [1,099 bytes]
- (hist) MSRT April 2012: Win32/Claretore [1,097 bytes]
- (hist) Silence Locker [1,094 bytes]
- (hist) Citadel plitfi botnet report [1,092 bytes]
- (hist) Etude sur le fonctionnement du Trojan.Matsnu.1 codant les données des utilisateurs [1,091 bytes]
- (hist) The underground economy of spam: a botmaster's perspective of coordinating large-scale spam campaigns [1,091 bytes]
- (hist) Spread of Darkness...Details on the public release of the Darkness DDoS bot [1,089 bytes]
- (hist) PlugX malware: A good hacker is an apologetic hacker [1,087 bytes]
- (hist) Analysis of ngrBot [1,087 bytes]
- (hist) DarkMegi rootkit - sample (distributed via Blackhole) [1,083 bytes]
- (hist) ZeuS v2 Malware Analysis - Part II [1,083 bytes]
- (hist) The mystery of Duqu framework solved [1,083 bytes]
- (hist) Angler Exploit Kit – Operating at the Cutting Edge [1,081 bytes]
- (hist) Citadel trojan touts trouble-ticket system [1,078 bytes]
- (hist) ZeuS: me talk pretty Finnish one day [1,076 bytes]
- (hist) Coreflood botnet - Detection and remediation [1,075 bytes]
- (hist) Trojan downloaders on the rise: don’t let Locky or TeslaCrypt ruin your day [1,074 bytes]
- (hist) Shamoon the Wiper in details [1,074 bytes]
- (hist) Sinowal: MBR rootkit never dies! (and it always brings some new clever features) [1,073 bytes]
- (hist) The Elderwood project (infographic) [1,072 bytes]
- (hist) Rannoh [1,072 bytes]
- (hist) Madi is back - New Tricks and a new Command&Control server [1,071 bytes]
- (hist) Backdoor:Win32/Caphaw.A [1,069 bytes]
- (hist) F-Secure has discovered MiniDuke malware samples in the wild [1,068 bytes]
- (hist) Analysis of the malware of Red October - Part 2 [1,068 bytes]
- (hist) New PoS malware “Backoff” targets US [1,067 bytes]
- (hist) Malware 2 - from infection to persistence [1,067 bytes]
- (hist) Un WOMBAT pour évaluer la cybercriminalité [1,063 bytes]
- (hist) TDL-4 [1,063 bytes]
- (hist) Attention! All data on your hardrive is encrypted [1,062 bytes]
- (hist) Cridex [1,060 bytes]
- (hist) AbaddonPOS: A new point of sale threat linked to Vawtrak [1,059 bytes]
- (hist) SIRv12: the obstinacy of Conficker [1,059 bytes]
- (hist) Harnig is back [1,056 bytes]
- (hist) Kaspersky security bulletin 2015. Overall statistics for 2015 [1,053 bytes]
- (hist) Ngrbot steals information and mine Bitcoins [1,052 bytes]
- (hist) One-man PoS malware operation captures 22,000 credit card details in Brazil [1,049 bytes]
- (hist) Tales from Crisis, Chapter 4: a ghost in the network [1,049 bytes]
- (hist) Threat spotlight: Angler lurking in the domain shadows [1,047 bytes]
- (hist) Overcoming reputation and proof-of-work systems in botnets [1,046 bytes]
- (hist) Digging inside Tinba malware - A walkthrough [1,045 bytes]
- (hist) Ransomware Fake Microsoft Security Essentials [1,043 bytes]
- (hist) GingerMaster Android Malware Utilizing A Root Exploit [1,043 bytes]
- (hist) Spambot evolution 2011 [1,040 bytes]
- (hist) Tilon-son of Silon [1,038 bytes]
- (hist) Revoyem [1,038 bytes]
- (hist) W32.Changeup: how the worm was created [1,033 bytes]
- (hist) De code van Dorifel nader bekeken [1,032 bytes]
- (hist) Stealthy peer-to-peer C&C over SMB pipes [1,030 bytes]
- (hist) Alina: casting a shadow on POS [1,029 bytes]
- (hist) TinyNuke may be a ticking time bomb [1,027 bytes]
- (hist) Exploring the market for stolen passwords [1,027 bytes]
- (hist) Scareware locks down computer due to child porn and terrorism [1,023 bytes]
- (hist) Ransomware ‘Holds Up’ victims [1,022 bytes]
- (hist) Get gamed and rue the day... [1,021 bytes]
- (hist) Android Marcher now marching via porn sites [1,020 bytes]
- (hist) Tatanga: a new banking trojan with MitB functions [1,020 bytes]
- (hist) Battling the Rustock threat [1,020 bytes]
- (hist) Cbeplay.P [1,015 bytes]
- (hist) New POS malware emerges - Punkey [1,013 bytes]
- (hist) NjRAT & H-Worm variant infections continue to rise [1,011 bytes]
- (hist) Malware Uses Google Go Language [1,009 bytes]
- (hist) Security alert: new Android malware - TigerBot - identified in alternative markets [1,009 bytes]
- (hist) CryptXXX: new ransomware from the actors behind Reveton, dropping via Angler [1,008 bytes]
- (hist) A study on botnet detection techniques [1,008 bytes]
- (hist) REVETON Ransomware Spreads with Old Tactics, New Infection Method [1,005 bytes]
- (hist) On botnets that use DNS for command and control [1,003 bytes]
- (hist) Kelihos is dead… No wait… Long live Kelihos! Again! [1,002 bytes]
- (hist) Kelihos botnet appears again with new variant [1,002 bytes]
- (hist) Bot shopping with my wife [998 bytes]
- (hist) Walking through Win32/Jabberbot.A instant messaging C&C [997 bytes]
- (hist) P2P botnet Kelihos.B with 100.000 nodes sinkholed [997 bytes]
- (hist) Atrax [994 bytes]
- (hist) Zorenium bot not half the threat it claims to be [992 bytes]
- (hist) Java Zero-Days and the Blackhole Exploit Kit [992 bytes]
- (hist) New GamaPoS malware piggybacks on Andromeda botnet; spreads in 13 US states [991 bytes]
- (hist) Nepalese government websites compromised to serve Zegost RAT [990 bytes]
- (hist) FighterPOS: a new one-man PoS malware campaign [985 bytes]
- (hist) Citadel : le fichier de configuration [983 bytes]
- (hist) Now you Z-(eus) it, now you don’t: ZeuS bots silently upgraded to Citadel [982 bytes]
- (hist) Disorderly conduct: localized malware impersonates the police [981 bytes]
- (hist) New crypto-ransomware emerge in the wild [977 bytes]
- (hist) OSX Kitmos analysis [977 bytes]
- (hist) ZACCESS/SIREFEF arrives with new infection technique [977 bytes]
- (hist) Latest SpyEye botnet active and cheaper [977 bytes]
- (hist) Skynet, a Tor-powered botnet straight from Reddit [974 bytes]
- (hist) Gamarue dropping Lethic bot [974 bytes]
- (hist) Kelihos/Hlux botnet returns with new techniques [974 bytes]
- (hist) Sony/Destover: mystery North Korean actor’s destructive and past network activity [971 bytes]
- (hist) The “Hikit” rootkit: advanced and persistent attack techniques (part 1) [971 bytes]
- (hist) A Foray into Conficker’s Logic and Rendezvous Points [970 bytes]
- (hist) New crimeware attacks LatAm bank users [966 bytes]
- (hist) Umbra [966 bytes]
- (hist) SpyEye [963 bytes]
- (hist) Ransomware : la sulfureuse hypothèse sur la situation chez Norsk Hydro [960 bytes]
- (hist) Sony PlayStation's site SQL injected, redirecting to rogue security software [958 bytes]
- (hist) Pexby [958 bytes]
- (hist) Ponmocup analysis [957 bytes]
- (hist) Proactive policy measures by Internet service providers against Botnets [957 bytes]
- (hist) Thor [956 bytes]
- (hist) Panda Security uncovers bot-killing malware [953 bytes]
- (hist) Twitter + Pastebin = malware update [951 bytes]
- (hist) Mocbot spam analysis [949 bytes]
- (hist) The ZeroAccess rootkit [949 bytes]
- (hist) Análisis del comportamiento de VOlk y sus funcionalidades [948 bytes]
- (hist) Trojan moves its configuration to Twitter, LinkedIn, MSDN and Baidu [948 bytes]
- (hist) The Coreflood report [948 bytes]
- (hist) Apple releases Java update; includes fix for vulnerability exploited by Flashback malware [947 bytes]
- (hist) Sinowal analysis (Windows 7, 32-bit) [947 bytes]
- (hist) Shylock financial malware back 'with a vengeance' [945 bytes]
- (hist) A chat with NGR Bot [945 bytes]
- (hist) Comfoo [944 bytes]
- (hist) Avatar rootkit: the continuing saga [942 bytes]
- (hist) DDoS watch: keeping an eye on Aldi Bot [942 bytes]
- (hist) Esthost taken down - Biggest cybercriminal takedown in history [941 bytes]
- (hist) Travnet botnet steals huge amount of sensitive data [940 bytes]
- (hist) Interconnection of Gauss with Stuxnet, Duqu & Flame [940 bytes]
- (hist) Dragonfly Threat Against Western Energy Suppliers [938 bytes]
- (hist) Latin American banks under fire from the Mexican VOlk-botnet [937 bytes]
- (hist) Trojan.Ransomgerpo criminal arrested [936 bytes]
- (hist) Android RATs branch out with Dendroid [934 bytes]
- (hist) Nymaim - obfuscation chronicles [933 bytes]
- (hist) Discovered: botnet costing display advertisers over six million dollars per month [932 bytes]
- (hist) Google Groups trojan [931 bytes]
- (hist) ZeroAccess: code injection chronicles [930 bytes]
- (hist) The "Red October" campaign - An advanced cyber espionage network targeting diplomatic and government agencies [927 bytes]
- (hist) Jagfu [927 bytes]
- (hist) Poisoned search results: How hackers have automated search engine poisoning attacks to distribute malware [925 bytes]
- (hist) Mpack installs ultra-invisible trojan [925 bytes]
- (hist) Fake FBI Ransomware analysis [925 bytes]
- (hist) Sopelka Botnet: three banking trojans and one banking panel [923 bytes]
- (hist) Ransomware: playing on your fears [923 bytes]
- (hist) Malware analysis of the Lurk downloader [922 bytes]
- (hist) Tobfy.N [921 bytes]
- (hist) RootSmart malware utilizes GingerBreak root exploit [920 bytes]
- (hist) Dyre Banking Trojan [920 bytes]
- (hist) Targeted information stealing attacks in South Asia use email, signed binaries [918 bytes]
- (hist) IRC bot for Android [917 bytes]
- (hist) Russian service online to check the detection of malware [916 bytes]
- (hist) Members of the largest criminal group engaged in online banking fraud are detained [915 bytes]
- (hist) NetTraveler [915 bytes]
- (hist) Botnet: classification, attacks, detection, tracing, and preventive measures [915 bytes]
- (hist) GandCrab ransomware distributed by RIG and GrandSoft exploit kits [913 bytes]
- (hist) The tigger trojan: icky, sticky stuff [912 bytes]
- (hist) Travnet trojan could be part of APT campaign [909 bytes]
- (hist) A ScarePakage variant is targeting more countries : impersonating Europol and AFP [907 bytes]
- (hist) Anaru malware now live and ready to steal [907 bytes]
- (hist) DistTrack [904 bytes]
- (hist) Malicious Apache module used for content injection: Linux/Chapro.A [903 bytes]
- (hist) AlertLock [903 bytes]
- (hist) Kaspersky Lab et Seculert annoncent la récente découverte de « Madi », une nouvelle attaque de cyberespionnage au Moyen‑Orient [901 bytes]
- (hist) New Apple Mac trojan called OSX/Crisis discovered [900 bytes]
- (hist) One bot to rule them all [896 bytes]
- (hist) Your files are encrypted with a “Windows 10 Upgrade” [895 bytes]
- (hist) Ysreef [894 bytes]
- (hist) File infector Expiro hits US, steals FTP credentials [892 bytes]
- (hist) Win32/Spy.Ranbyus modifying Java code in RBS Ukraine systems [892 bytes]
- (hist) Joint strike force against Dorifel [890 bytes]
- (hist) Carberp + BlackHole = growing fraud incidents [890 bytes]
- (hist) Three month FrameworkPOS malware campaign nabs ~43,000 credit cards from point of sale systems [889 bytes]
- (hist) Mastermind behind Gozi bank malware charged along with two others [888 bytes]
- (hist) Rovnix bootkit framework updated [888 bytes]
- (hist) The 'Penquin' Turla [888 bytes]
- (hist) Crypto breakthrough shows Flame was designed by world-class scientists [885 bytes]
- (hist) Morto worm sets a (DNS) record [882 bytes]
- (hist) Tequila [882 bytes]
- (hist) Encyclopedia entry: Win32/Conficker [880 bytes]
- (hist) The MiniDuke mystery: PDF 0-day government spy assembler 0x29A micro backdoor [878 bytes]
- (hist) New ransomware plays its victims an audio file, over and over and over… [874 bytes]
- (hist) NetTraveler APT gets a makeover for 10th birthday [873 bytes]
- (hist) Lifting the lid on the Redkit exploit kit (Part 1) [873 bytes]
- (hist) Saudi Aramco hit by computer virus [873 bytes]
- (hist) The mystery of Duqu: part ten [873 bytes]
- (hist) VinSelf - A new backdoor in town [870 bytes]
- (hist) Feodo - a new botnet on the rise [869 bytes]
- (hist) New Chinese exploit pack [869 bytes]
- (hist) SPL exploit kit – now with CVE-2013-0422 [867 bytes]
- (hist) Pushdo botnet gets DGA update, over 6,000 machines host new variant [867 bytes]
- (hist) An overview of exploit packs [866 bytes]
- (hist) Mysterious Avatar rootkit with API, SDK, and Yahoo Groups for C&C communication [865 bytes]
- (hist) Waledac gets cozy with Virut [864 bytes]
- (hist) "njRAT" Uncovered [863 bytes]
- (hist) Nitol DDoS botnet discovered in China [863 bytes]
- (hist) “Nemanja” botnet identified by IntelCrawler – Over a thousand point-of-sales, grocery management and accounting systems are compromised all over the world [862 bytes]
- (hist) Analysis of a PlugX malware variant used for targeted attacks [862 bytes]
- (hist) Analysis of the malware of Red October - Part 1 [862 bytes]
- (hist) Zemra [862 bytes]
- (hist) Leouncia - Yet another backdoor [861 bytes]
- (hist) Apache binary backdoors on Cpanel-based servers [859 bytes]
- (hist) Ransomware crimeware kits [857 bytes]
- (hist) OphionLocker: Joining in the Ransomware Race [857 bytes]
- (hist) CVE-2011-0611 [856 bytes]
- (hist) Latest Kelihos botnet shut down live at RSA Conference 2013 [856 bytes]
- (hist) CTB-Locker is back: the web server edition [854 bytes]
- (hist) Raxm [852 bytes]
- (hist) Top spam botnets exposed [851 bytes]
- (hist) CVE-2012-0507 [850 bytes]
- (hist) Infamous Skynet botnet author allegedly arrested [849 bytes]
- (hist) FBI shuts down Coreflood botnet, zombies transmitting financial data [849 bytes]
- (hist) Dharma Ransomware Uses AV Tool to Distract from Malicious Activities [848 bytes]