Long pages
Jump to navigation
Jump to search
Showing below up to 500 results in range #251 to #750.
View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)
- (hist) Security alert: new TGLoader Android malware utilizes the exploid root exploit [1,166 bytes]
- (hist) Mirage [1,166 bytes]
- (hist) The mystery of Duqu: part three [1,164 bytes]
- (hist) Pramro and Sality - two PEs in a pod [1,164 bytes]
- (hist) The rise of TOR-based botnets [1,163 bytes]
- (hist) Obama order sped up wave of cyberattacks against Iran [1,163 bytes]
- (hist) Clampi/Ligats/Ilomo trojan [1,162 bytes]
- (hist) MSRT September '12 - Medfos, hijacking your daily search [1,159 bytes]
- (hist) A peek inside the Darkness (Optima) DDoS Bot [1,159 bytes]
- (hist) Ransomware and Silence Locker control panel [1,157 bytes]
- (hist) Srizbi [1,156 bytes]
- (hist) W32.Tinba (Tinybanker) The turkish incident [1,152 bytes]
- (hist) Long life to Kelihos! [1,149 bytes]
- (hist) Versatile and infectious: Win64/Expiro is a cross-platform file infector [1,148 bytes]
- (hist) From Georgia, with love Win32/Georbot [1,146 bytes]
- (hist) Duqu FAQ [1,146 bytes]
- (hist) Koobface [1,145 bytes]
- (hist) Trojan Nap aka Kelihos/Hlux - Feb. 2013 status update [1,144 bytes]
- (hist) NGRBot spreads via chat [1,141 bytes]
- (hist) NetTraveler is back: the 'Red Star' APT returns with new tricks [1,139 bytes]
- (hist) Petya ransomware skips the files and encrypts your hard drive instead [1,135 bytes]
- (hist) Casier [1,135 bytes]
- (hist) Vawtrak gains momentum and expands targets [1,135 bytes]
- (hist) The lifecycle of peer-to-peer (Gameover) ZeuS [1,134 bytes]
- (hist) Back to Stuxnet: the missing link [1,133 bytes]
- (hist) An Analysis of the iKeeB (duh) iPhone botnet (Worm) [1,128 bytes]
- (hist) Torpig [1,126 bytes]
- (hist) Adobe Flash Player 0-day and HackingTeam's Remote Control System [1,124 bytes]
- (hist) Carberp-in-the-Mobile [1,123 bytes]
- (hist) Watch out for CoreBot, new stealer in the wild [1,122 bytes]
- (hist) Domain generation algorithms (DGA) in stealthy malware [1,121 bytes]
- (hist) Sobig [1,121 bytes]
- (hist) Newly launched ‘HTTP-based botnet setup as a service’ empowers novice cybercriminals with bulletproof hosting capabilities [1,117 bytes]
- (hist) Covert channels over social networks [1,116 bytes]
- (hist) Malware evolving to defeat anti-DDoS services like CloudFlare? [1,116 bytes]
- (hist) Survey on network-based botnet detection methods [1,115 bytes]
- (hist) Win32/Gataka banking Trojan - Detailed analysis [1,114 bytes]
- (hist) Miniduke [1,113 bytes]
- (hist) Full analysis of Flame's command & control servers [1,113 bytes]
- (hist) Disttrack sabotage malware wipes data at unnamed Middle East energy organization [1,113 bytes]
- (hist) Hesperbot [1,112 bytes]
- (hist) Measuring and detecting Fast-Flux service networks [1,112 bytes]
- (hist) TR-24 analysis - Destory RAT family [1,109 bytes]
- (hist) Tales from Crisis, Chapter 3: The Italian rootkit job [1,106 bytes]
- (hist) Carbanak/Anunak in the BlueCoat malware analysis appliance [1,105 bytes]
- (hist) Coreflood [1,105 bytes]
- (hist) Solar [1,104 bytes]
- (hist) PickPocket [1,102 bytes]
- (hist) Operation SnowMan: DeputyDog actor compromises US veterans of foreign wars website [1,099 bytes]
- (hist) Reversing Andromeda-Gamarue botnet [1,099 bytes]
- (hist) Digging into the Nitol DDoS botnet [1,099 bytes]
- (hist) MSRT April 2012: Win32/Claretore [1,097 bytes]
- (hist) Silence Locker [1,094 bytes]
- (hist) Citadel plitfi botnet report [1,092 bytes]
- (hist) Etude sur le fonctionnement du Trojan.Matsnu.1 codant les données des utilisateurs [1,091 bytes]
- (hist) The underground economy of spam: a botmaster's perspective of coordinating large-scale spam campaigns [1,091 bytes]
- (hist) Spread of Darkness...Details on the public release of the Darkness DDoS bot [1,089 bytes]
- (hist) PlugX malware: A good hacker is an apologetic hacker [1,087 bytes]
- (hist) Analysis of ngrBot [1,087 bytes]
- (hist) DarkMegi rootkit - sample (distributed via Blackhole) [1,083 bytes]
- (hist) ZeuS v2 Malware Analysis - Part II [1,083 bytes]
- (hist) The mystery of Duqu framework solved [1,083 bytes]
- (hist) Angler Exploit Kit – Operating at the Cutting Edge [1,081 bytes]
- (hist) Citadel trojan touts trouble-ticket system [1,078 bytes]
- (hist) ZeuS: me talk pretty Finnish one day [1,076 bytes]
- (hist) Coreflood botnet - Detection and remediation [1,075 bytes]
- (hist) Trojan downloaders on the rise: don’t let Locky or TeslaCrypt ruin your day [1,074 bytes]
- (hist) Shamoon the Wiper in details [1,074 bytes]
- (hist) Sinowal: MBR rootkit never dies! (and it always brings some new clever features) [1,073 bytes]
- (hist) The Elderwood project (infographic) [1,072 bytes]
- (hist) Rannoh [1,072 bytes]
- (hist) Madi is back - New Tricks and a new Command&Control server [1,071 bytes]
- (hist) Backdoor:Win32/Caphaw.A [1,069 bytes]
- (hist) F-Secure has discovered MiniDuke malware samples in the wild [1,068 bytes]
- (hist) Analysis of the malware of Red October - Part 2 [1,068 bytes]
- (hist) New PoS malware “Backoff” targets US [1,067 bytes]
- (hist) Malware 2 - from infection to persistence [1,067 bytes]
- (hist) Un WOMBAT pour évaluer la cybercriminalité [1,063 bytes]
- (hist) TDL-4 [1,063 bytes]
- (hist) Attention! All data on your hardrive is encrypted [1,062 bytes]
- (hist) Cridex [1,060 bytes]
- (hist) AbaddonPOS: A new point of sale threat linked to Vawtrak [1,059 bytes]
- (hist) SIRv12: the obstinacy of Conficker [1,059 bytes]
- (hist) Harnig is back [1,056 bytes]
- (hist) Kaspersky security bulletin 2015. Overall statistics for 2015 [1,053 bytes]
- (hist) Ngrbot steals information and mine Bitcoins [1,052 bytes]
- (hist) One-man PoS malware operation captures 22,000 credit card details in Brazil [1,049 bytes]
- (hist) Tales from Crisis, Chapter 4: a ghost in the network [1,049 bytes]
- (hist) Threat spotlight: Angler lurking in the domain shadows [1,047 bytes]
- (hist) Overcoming reputation and proof-of-work systems in botnets [1,046 bytes]
- (hist) Digging inside Tinba malware - A walkthrough [1,045 bytes]
- (hist) Ransomware Fake Microsoft Security Essentials [1,043 bytes]
- (hist) GingerMaster Android Malware Utilizing A Root Exploit [1,043 bytes]
- (hist) Spambot evolution 2011 [1,040 bytes]
- (hist) Tilon-son of Silon [1,038 bytes]
- (hist) Revoyem [1,038 bytes]
- (hist) W32.Changeup: how the worm was created [1,033 bytes]
- (hist) De code van Dorifel nader bekeken [1,032 bytes]
- (hist) Stealthy peer-to-peer C&C over SMB pipes [1,030 bytes]
- (hist) Alina: casting a shadow on POS [1,029 bytes]
- (hist) TinyNuke may be a ticking time bomb [1,027 bytes]
- (hist) Exploring the market for stolen passwords [1,027 bytes]
- (hist) Scareware locks down computer due to child porn and terrorism [1,023 bytes]
- (hist) Ransomware ‘Holds Up’ victims [1,022 bytes]
- (hist) Get gamed and rue the day... [1,021 bytes]
- (hist) Android Marcher now marching via porn sites [1,020 bytes]
- (hist) Tatanga: a new banking trojan with MitB functions [1,020 bytes]
- (hist) Battling the Rustock threat [1,020 bytes]
- (hist) Cbeplay.P [1,015 bytes]
- (hist) New POS malware emerges - Punkey [1,013 bytes]
- (hist) NjRAT & H-Worm variant infections continue to rise [1,011 bytes]
- (hist) Security alert: new Android malware - TigerBot - identified in alternative markets [1,009 bytes]
- (hist) Malware Uses Google Go Language [1,009 bytes]
- (hist) CryptXXX: new ransomware from the actors behind Reveton, dropping via Angler [1,008 bytes]
- (hist) A study on botnet detection techniques [1,008 bytes]
- (hist) REVETON Ransomware Spreads with Old Tactics, New Infection Method [1,005 bytes]
- (hist) On botnets that use DNS for command and control [1,003 bytes]
- (hist) Kelihos is dead… No wait… Long live Kelihos! Again! [1,002 bytes]
- (hist) Kelihos botnet appears again with new variant [1,002 bytes]
- (hist) Bot shopping with my wife [998 bytes]
- (hist) Walking through Win32/Jabberbot.A instant messaging C&C [997 bytes]
- (hist) P2P botnet Kelihos.B with 100.000 nodes sinkholed [997 bytes]
- (hist) Atrax [994 bytes]
- (hist) Zorenium bot not half the threat it claims to be [992 bytes]
- (hist) Java Zero-Days and the Blackhole Exploit Kit [992 bytes]
- (hist) New GamaPoS malware piggybacks on Andromeda botnet; spreads in 13 US states [991 bytes]
- (hist) Nepalese government websites compromised to serve Zegost RAT [990 bytes]
- (hist) FighterPOS: a new one-man PoS malware campaign [985 bytes]
- (hist) Citadel : le fichier de configuration [983 bytes]
- (hist) Now you Z-(eus) it, now you don’t: ZeuS bots silently upgraded to Citadel [982 bytes]
- (hist) Disorderly conduct: localized malware impersonates the police [981 bytes]
- (hist) New crypto-ransomware emerge in the wild [977 bytes]
- (hist) OSX Kitmos analysis [977 bytes]
- (hist) ZACCESS/SIREFEF arrives with new infection technique [977 bytes]
- (hist) Latest SpyEye botnet active and cheaper [977 bytes]
- (hist) Skynet, a Tor-powered botnet straight from Reddit [974 bytes]
- (hist) Gamarue dropping Lethic bot [974 bytes]
- (hist) Kelihos/Hlux botnet returns with new techniques [974 bytes]
- (hist) Sony/Destover: mystery North Korean actor’s destructive and past network activity [971 bytes]
- (hist) The “Hikit” rootkit: advanced and persistent attack techniques (part 1) [971 bytes]
- (hist) A Foray into Conficker’s Logic and Rendezvous Points [970 bytes]
- (hist) New crimeware attacks LatAm bank users [966 bytes]
- (hist) Umbra [966 bytes]
- (hist) SpyEye [963 bytes]
- (hist) Ransomware : la sulfureuse hypothèse sur la situation chez Norsk Hydro [960 bytes]
- (hist) Sony PlayStation's site SQL injected, redirecting to rogue security software [958 bytes]
- (hist) Pexby [958 bytes]
- (hist) Ponmocup analysis [957 bytes]
- (hist) Proactive policy measures by Internet service providers against Botnets [957 bytes]
- (hist) Thor [956 bytes]
- (hist) Panda Security uncovers bot-killing malware [953 bytes]
- (hist) Twitter + Pastebin = malware update [951 bytes]
- (hist) Mocbot spam analysis [949 bytes]
- (hist) The ZeroAccess rootkit [949 bytes]
- (hist) Análisis del comportamiento de VOlk y sus funcionalidades [948 bytes]
- (hist) Trojan moves its configuration to Twitter, LinkedIn, MSDN and Baidu [948 bytes]
- (hist) The Coreflood report [948 bytes]
- (hist) Apple releases Java update; includes fix for vulnerability exploited by Flashback malware [947 bytes]
- (hist) Sinowal analysis (Windows 7, 32-bit) [947 bytes]
- (hist) A chat with NGR Bot [945 bytes]
- (hist) Shylock financial malware back 'with a vengeance' [945 bytes]
- (hist) Comfoo [944 bytes]
- (hist) Avatar rootkit: the continuing saga [942 bytes]
- (hist) DDoS watch: keeping an eye on Aldi Bot [942 bytes]
- (hist) Esthost taken down - Biggest cybercriminal takedown in history [941 bytes]
- (hist) Travnet botnet steals huge amount of sensitive data [940 bytes]
- (hist) Interconnection of Gauss with Stuxnet, Duqu & Flame [940 bytes]
- (hist) Dragonfly Threat Against Western Energy Suppliers [938 bytes]
- (hist) Latin American banks under fire from the Mexican VOlk-botnet [937 bytes]
- (hist) Trojan.Ransomgerpo criminal arrested [936 bytes]
- (hist) Android RATs branch out with Dendroid [934 bytes]
- (hist) Nymaim - obfuscation chronicles [933 bytes]
- (hist) Discovered: botnet costing display advertisers over six million dollars per month [932 bytes]
- (hist) Google Groups trojan [931 bytes]
- (hist) ZeroAccess: code injection chronicles [930 bytes]
- (hist) Jagfu [927 bytes]
- (hist) The "Red October" campaign - An advanced cyber espionage network targeting diplomatic and government agencies [927 bytes]
- (hist) Poisoned search results: How hackers have automated search engine poisoning attacks to distribute malware [925 bytes]
- (hist) Mpack installs ultra-invisible trojan [925 bytes]
- (hist) Fake FBI Ransomware analysis [925 bytes]
- (hist) Sopelka Botnet: three banking trojans and one banking panel [923 bytes]
- (hist) Ransomware: playing on your fears [923 bytes]
- (hist) Malware analysis of the Lurk downloader [922 bytes]
- (hist) Tobfy.N [921 bytes]
- (hist) RootSmart malware utilizes GingerBreak root exploit [920 bytes]
- (hist) Dyre Banking Trojan [920 bytes]
- (hist) Targeted information stealing attacks in South Asia use email, signed binaries [918 bytes]
- (hist) IRC bot for Android [917 bytes]
- (hist) Russian service online to check the detection of malware [916 bytes]
- (hist) Members of the largest criminal group engaged in online banking fraud are detained [915 bytes]
- (hist) NetTraveler [915 bytes]
- (hist) Botnet: classification, attacks, detection, tracing, and preventive measures [915 bytes]
- (hist) GandCrab ransomware distributed by RIG and GrandSoft exploit kits [913 bytes]
- (hist) The tigger trojan: icky, sticky stuff [912 bytes]
- (hist) Travnet trojan could be part of APT campaign [909 bytes]
- (hist) A ScarePakage variant is targeting more countries : impersonating Europol and AFP [907 bytes]
- (hist) Anaru malware now live and ready to steal [907 bytes]
- (hist) DistTrack [904 bytes]
- (hist) Malicious Apache module used for content injection: Linux/Chapro.A [903 bytes]
- (hist) AlertLock [903 bytes]
- (hist) Kaspersky Lab et Seculert annoncent la récente découverte de « Madi », une nouvelle attaque de cyberespionnage au Moyen‑Orient [901 bytes]
- (hist) New Apple Mac trojan called OSX/Crisis discovered [900 bytes]
- (hist) One bot to rule them all [896 bytes]
- (hist) Your files are encrypted with a “Windows 10 Upgrade” [895 bytes]
- (hist) Ysreef [894 bytes]
- (hist) File infector Expiro hits US, steals FTP credentials [892 bytes]
- (hist) Win32/Spy.Ranbyus modifying Java code in RBS Ukraine systems [892 bytes]
- (hist) Carberp + BlackHole = growing fraud incidents [890 bytes]
- (hist) Joint strike force against Dorifel [890 bytes]
- (hist) Three month FrameworkPOS malware campaign nabs ~43,000 credit cards from point of sale systems [889 bytes]
- (hist) Mastermind behind Gozi bank malware charged along with two others [888 bytes]
- (hist) Rovnix bootkit framework updated [888 bytes]
- (hist) The 'Penquin' Turla [888 bytes]
- (hist) Crypto breakthrough shows Flame was designed by world-class scientists [885 bytes]
- (hist) Morto worm sets a (DNS) record [882 bytes]
- (hist) Tequila [882 bytes]
- (hist) Encyclopedia entry: Win32/Conficker [880 bytes]
- (hist) The MiniDuke mystery: PDF 0-day government spy assembler 0x29A micro backdoor [878 bytes]
- (hist) New ransomware plays its victims an audio file, over and over and over… [874 bytes]
- (hist) The mystery of Duqu: part ten [873 bytes]
- (hist) NetTraveler APT gets a makeover for 10th birthday [873 bytes]
- (hist) Lifting the lid on the Redkit exploit kit (Part 1) [873 bytes]
- (hist) Saudi Aramco hit by computer virus [873 bytes]
- (hist) VinSelf - A new backdoor in town [870 bytes]
- (hist) Feodo - a new botnet on the rise [869 bytes]
- (hist) New Chinese exploit pack [869 bytes]
- (hist) SPL exploit kit – now with CVE-2013-0422 [867 bytes]
- (hist) Pushdo botnet gets DGA update, over 6,000 machines host new variant [867 bytes]
- (hist) An overview of exploit packs [866 bytes]
- (hist) Mysterious Avatar rootkit with API, SDK, and Yahoo Groups for C&C communication [865 bytes]
- (hist) Waledac gets cozy with Virut [864 bytes]
- (hist) "njRAT" Uncovered [863 bytes]
- (hist) Nitol DDoS botnet discovered in China [863 bytes]
- (hist) “Nemanja” botnet identified by IntelCrawler – Over a thousand point-of-sales, grocery management and accounting systems are compromised all over the world [862 bytes]
- (hist) Analysis of a PlugX malware variant used for targeted attacks [862 bytes]
- (hist) Analysis of the malware of Red October - Part 1 [862 bytes]
- (hist) Zemra [862 bytes]
- (hist) Leouncia - Yet another backdoor [861 bytes]
- (hist) Apache binary backdoors on Cpanel-based servers [859 bytes]
- (hist) Ransomware crimeware kits [857 bytes]
- (hist) OphionLocker: Joining in the Ransomware Race [857 bytes]
- (hist) CVE-2011-0611 [856 bytes]
- (hist) Latest Kelihos botnet shut down live at RSA Conference 2013 [856 bytes]
- (hist) CTB-Locker is back: the web server edition [854 bytes]
- (hist) Raxm [852 bytes]
- (hist) Top spam botnets exposed [851 bytes]
- (hist) CVE-2012-0507 [850 bytes]
- (hist) Infamous Skynet botnet author allegedly arrested [849 bytes]
- (hist) FBI shuts down Coreflood botnet, zombies transmitting financial data [849 bytes]
- (hist) Dharma Ransomware Uses AV Tool to Distract from Malicious Activities [848 bytes]
- (hist) MSRT June '12 - cleanup on aisle one [845 bytes]
- (hist) PlugX: some uncovered points [844 bytes]
- (hist) The growing threat to business banking online [843 bytes]
- (hist) Crypto experts called on to crack cyberspy tool's encryption [842 bytes]
- (hist) The Waledac protocol: the how and why [842 bytes]
- (hist) New IE Zero-Day used in targeted attacks [841 bytes]
- (hist) Security experts detected new Twitter-controlled botnet [841 bytes]
- (hist) Galock [841 bytes]
- (hist) Citadel: a cyber-criminal’s ultimate weapon? [840 bytes]
- (hist) Battling the Zbot threat [840 bytes]
- (hist) NewPosThings has new PoS things [839 bytes]
- (hist) Trusteer warns of new two headed trojan attack against online banks [838 bytes]
- (hist) Virus scanners for virus authors, part II [837 bytes]
- (hist) Dorifel is much bigger than expected and it’s still active and growing! [835 bytes]
- (hist) Bagle [835 bytes]
- (hist) Attack on Zygote: a new twist in the evolution of mobile threats [833 bytes]
- (hist) Detecting extended attributes (ZeroAccess) and other Frankenstein’s monsters with HMFT [833 bytes]
- (hist) Analysis of functions used to encode strings in Flame (GDB script) [833 bytes]
- (hist) Under the hood of the cyber attack on U.S. banks [832 bytes]
- (hist) Apple took 3 years to fix Finfisher trojan hole [832 bytes]
- (hist) Research Win32/Slenfbot [831 bytes]
- (hist) Armenian Bredolab creator jailed for computer sabotage [827 bytes]
- (hist) Mariposa botnet 'mastermind' jailed in Slovenia [826 bytes]
- (hist) Targeted destructive malware explained: Troj/Mdrop-ELD [824 bytes]
- (hist) From Sakura to Reveton via Smoke Bot - or a botnet distribution of Reveton [821 bytes]
- (hist) QuickPost: Flame & Volatility [821 bytes]
- (hist) Accdfisa [821 bytes]
- (hist) Americana Dreams [820 bytes]
- (hist) ‘Dexter’ virus targets point-of-sale terminals [819 bytes]
- (hist) Security alert: SpamSoldier [819 bytes]
- (hist) McAfee Labs threat advisory : W32.Pinkslipbot [819 bytes]
- (hist) Clampi [818 bytes]
- (hist) Operation Socialist The Inside Story Of How British Spies Hacked Belgium’s Largest Telco [818 bytes]
- (hist) Apple zombie malware 'NetWeird' rummages for browser and email passwords [817 bytes]
- (hist) Analyzing a new exploit pack [816 bytes]
- (hist) Going solo: self-propagating ZBOT malware spotted [816 bytes]
- (hist) Virut malware fuels Waledac botnet resurgence [816 bytes]
- (hist) Virus Gendarmerie : variante Office Centrale de Luttre contre la criminalité – controle informationnel [815 bytes]
- (hist) New Duqu sample found in the wild [814 bytes]
- (hist) Kraken botnet infiltration [814 bytes]
- (hist) Trojan.Whitewell: what’s your (bot) Facebook status today? [812 bytes]
- (hist) OSX/Crisis has been used as part of a targeted attack [812 bytes]
- (hist) Malware for everyone - Aldi Bot at a discount price [812 bytes]
- (hist) CTB-Locker [812 bytes]
- (hist) The anatomy of a botnet [811 bytes]
- (hist) Rmnet.12 created a million Windows computer botnet [810 bytes]
- (hist) The mystery of Duqu: part five [808 bytes]
- (hist) Advancing the fight against botnets with consumer notifications [807 bytes]
- (hist) Alina: following the shadow part 2 [806 bytes]
- (hist) Crisis for Windows sneaks onto virtual machines [805 bytes]
- (hist) Part virus, part botnet, spreading fast: Ramnit moves past Facebook passwords [805 bytes]
- (hist) More details of the Dorifel servers [804 bytes]
- (hist) An overview of messaging botnets [804 bytes]
- (hist) Secrets of the Comfoo masters [802 bytes]
- (hist) Massive search fraud botnet seized by Microsoft and Symantec [801 bytes]
- (hist) Lyposit [801 bytes]
- (hist) Social networks – A bonanza for cybercriminals [800 bytes]
- (hist) Koobface, un écosystème cybercriminel ou le conte des Mille et une nuits ? [800 bytes]
- (hist) OSX/Flashback - The first malware to infect hundreds of thousands of Apple Mac [794 bytes]
- (hist) Upatre, Dyre used in Univ. of Florida attack [794 bytes]
- (hist) The Miner botnet: Bitcoin mining goes peer-to-peer [793 bytes]
- (hist) Darkmegi: this is not the Rootkit you’re looking for [793 bytes]
- (hist) Bitcrypt broken [792 bytes]
- (hist) Mexican Twitter-controlled botnet unpicked [791 bytes]
- (hist) Flame: replication via Windows Update MITM proxy [790 bytes]
- (hist) Look what I found: it's a Pony! [788 bytes]
- (hist) Boxer SMS trojan: malware as a global service [787 bytes]
- (hist) The case of TDL3 [785 bytes]
- (hist) Malware hunting with the Sysinternals tools [784 bytes]
- (hist) More Flame/Skywiper CNC behavior uncovered [783 bytes]
- (hist) Pitou [783 bytes]
- (hist) What was that Wiper thing? [782 bytes]
- (hist) Monkif botnet hides commands in JPEGs [782 bytes]
- (hist) Wire Transfer Spam Spreads Upatre [782 bytes]
- (hist) Quervar – Induc.C reincarnate [781 bytes]
- (hist) The most sophisticated Android trojan [780 bytes]
- (hist) Tracking down the author of the PlugX RAT [778 bytes]
- (hist) The Mirage campaign [777 bytes]
- (hist) Doctor Web a détecté un botnet enrôlant plus de 550 000 Mac [777 bytes]
- (hist) Blackhole and Cool Exploit kits nearly extinct [776 bytes]
- (hist) Darkness DDoS bot version identification guide [775 bytes]
- (hist) First widespread virus cross-infection [774 bytes]
- (hist) Actually, my name is Duqu - Stuxnet is my middle name [773 bytes]
- (hist) ZeuS Gameover overview [772 bytes]
- (hist) "Crypto Ransomware" CTB-Locker (Critroni.A) on the rise [772 bytes]
- (hist) Worm:VBS/Jenxcus [771 bytes]
- (hist) Java Runtime Environment 1.7 Zero-Day Exploit Delivers Backdoor [770 bytes]
- (hist) New crypto-ransomware JIGSAW plays nasty games [769 bytes]
- (hist) Confidential documents from Japanese politics stolen by malware [769 bytes]
- (hist) Microsoft security updates January 2016 [765 bytes]
- (hist) An analysis of the cross-platform backdoor NetWeirdRC [765 bytes]
- (hist) Equation: the Death Star of malware galaxy [764 bytes]
- (hist) New RATs emerge from leaked Njw0rm source code [762 bytes]
- (hist) What’s the buzz with Bafruz [761 bytes]
- (hist) Conficker working group: lessons learned [760 bytes]
- (hist) Supern0va [760 bytes]
- (hist) Win32/64:Napolar: New trojan shines on the cyber crime-scene [759 bytes]
- (hist) Shamoon the Wiper: further details (Part II) [759 bytes]
- (hist) Encriyoko [759 bytes]
- (hist) UBot [758 bytes]
- (hist) First step in cross-platform Trojan bankers from Brazil done [758 bytes]
- (hist) Disttrack malware overwrites files, infects MBR [756 bytes]
- (hist) Relentless Zbot and anti-emulations [756 bytes]
- (hist) Blackhole exploit kit v2 on the rise [755 bytes]
- (hist) International cyber ring that infected millions of computers dismantled [755 bytes]
- (hist) Bot herders build newer versions of previous botnet Waledac [753 bytes]
- (hist) Malicious Apache module injects Iframes [753 bytes]
- (hist) Trojan.Prinimalka: bits and pieces [753 bytes]
- (hist) Vicas [753 bytes]
- (hist) Inside an APT campaign with multiple targets in India and Japan [752 bytes]
- (hist) TDI - a new element in old TDSS story [752 bytes]
- (hist) New point-of-sale malware distributed by Andromeda botnet [751 bytes]
- (hist) Qadars: un nouveau malware bancaire avec un composant mobile [750 bytes]
- (hist) Madi [750 bytes]
- (hist) Mac spyware found at Oslo Freedom Forum [747 bytes]
- (hist) Who's behind the Koobface botnet? - An OSINT analysis [746 bytes]
- (hist) Updated Sundown Exploit Kit Uses Steganography [745 bytes]
- (hist) Shamoon the wiper - copycats at work [744 bytes]
- (hist) HTran and the Advanced Persistent Threat [743 bytes]
- (hist) Studma [742 bytes]
- (hist) The mystery of Duqu: part two [741 bytes]
- (hist) Cutwail [741 bytes]
- (hist) Behind the Captcha or Inside Blackhole Exploit Kit 2.0 - Exploit Kit Administration Panel [740 bytes]
- (hist) PlugX: new tool for a not so new campaign [740 bytes]
- (hist) HerpesNet botnet 1.7 [740 bytes]
- (hist) Have we seen the end of the ZeroAccess botnet? [739 bytes]
- (hist) Carberp reverse engineering [738 bytes]
- (hist) Overview: inside the ZeuS trojan’s source code [737 bytes]
- (hist) Inside Impact exploit kit [736 bytes]
- (hist) Ramnit goes social [736 bytes]
- (hist) Ransomware or Wiper? LockerGoga Straddles the Line [735 bytes]
- (hist) Reveton.A [735 bytes]
- (hist) VertexNet [734 bytes]
- (hist) Bot of the day: Ramnit/Ninmul [733 bytes]
- (hist) PETYA crypto-ransomware overwrites MBR to lock users out of their computers [731 bytes]
- (hist) Internet Census 2012, port scanning /0 using insecure embedded devices [730 bytes]
- (hist) Trojan.Tatanarg.B careful! [730 bytes]
- (hist) New CryptoLocker spreads via removable drives [727 bytes]
- (hist) Win32/Virlock: First Self-Reproducing Ransomware is also a Shape Shifter [727 bytes]
- (hist) The world's biggest botnets [726 bytes]
- (hist) Trojan ChePro, the CPL storm [725 bytes]
- (hist) ZeuS – P2P+DGA variant – mapping out and understanding the threat [724 bytes]
- (hist) NASK shuts down dangerous Virut botnet domains [722 bytes]
- (hist) Insights into Win32/Bradop [722 bytes]
- (hist) Oderoor [722 bytes]
- (hist) Backdoor uses Evernote as command and control server [721 bytes]
- (hist) DDoS attacks: the Zemra bot [721 bytes]
- (hist) Citadel V1.3.5.1: enter the fort’s dungeons [720 bytes]
- (hist) ZeroLocker won't come to your rescue [720 bytes]
- (hist) Chameleon botnet grabbed $6m A MONTH from online ad-slingers [717 bytes]
- (hist) Reveton += HU, LV, SK, SI, TR (!), RO - So spreading accross Europe with 6 new Design [717 bytes]
- (hist) A quick update on spambot Kelihos [716 bytes]
- (hist) Cool Exploit Kit - A new Browser Exploit Pack on the Battlefield with a "Duqu" like font drop [716 bytes]
- (hist) REvil ransomware gang's web sites mysteriously shut down [714 bytes]
- (hist) Tis the season for shipping and phishing [712 bytes]
- (hist) MSRT November '12 - Weelsof around the world [711 bytes]
- (hist) CVE-2012-0158 [710 bytes]
- (hist) The life cycle of web server botnet recruitment [710 bytes]
- (hist) Urausy improving its localization - A (the\?) Gaelic Ransomware with Interpol impersonation as default landing [710 bytes]
- (hist) Dorifel [709 bytes]
- (hist) Andromeda [709 bytes]
- (hist) Reveton Autumn Collection += AU,CZ, IE, NO & 17 new design [708 bytes]
- (hist) SamSam ransomware designed to inundate targeted networks with thousands of copies of itself [706 bytes]
- (hist) MoVP 1.3 Desktops, heaps, and ransomware [706 bytes]
- (hist) The resurrection of RedKit [705 bytes]
- (hist) ScarePakage [705 bytes]
- (hist) Maazben: best of both worlds [704 bytes]
- (hist) The “Hikit” rootkit: advanced and persistent attack techniques (part 2) [700 bytes]
- (hist) OSX.iService its not going to iWork for you [700 bytes]
- (hist) MMD-0056-2016 - Linux/Mirai, how an old ELF malcode is recycled [697 bytes]
- (hist) Symantec/Backdoor.Arcomrat [697 bytes]
- (hist) Punkey [693 bytes]
- (hist) 'Tigger' trojan keeps security researchers hopping [693 bytes]
- (hist) Analysis of TDL4 [692 bytes]
- (hist) The good , the bad and the unknown online scanners [691 bytes]
- (hist) The Andromeda/Gamarue botnet is on the rise again [691 bytes]
- (hist) Introducing Ponmocup-Finder [691 bytes]
- (hist) MDK: the largest mobile botnet in China [689 bytes]
- (hist) TorrentLocker ransomware uses email authentication to refine spam runs [687 bytes]
- (hist) BandarChor [686 bytes]
- (hist) Locky Ransomware switches to the Lukitus extension for Encrypted Files [684 bytes]
- (hist) FakeM [684 bytes]
- (hist) Festi [683 bytes]
- (hist) Symantec/W32.Zorenium [681 bytes]
- (hist) Akbot [681 bytes]
- (hist) The ‘Madi’ infostealers - a detailed analysis [680 bytes]
- (hist) Uremtoo [680 bytes]
- (hist) CVE-2013-2465/CVE-2013-2471/CVE-2013-2463 integrating Exploit Kits -- jre7u21 CVE- jre6u45 and earlier [678 bytes]
- (hist) The Epic Turla operation [678 bytes]
- (hist) ZeroAccess - new steps in evolution [678 bytes]
- (hist) TDL4 - Top Bot [677 bytes]
- (hist) Olmasco bootkit: next circle of TDL4 evolution (or not) [676 bytes]
- (hist) Analysis of DarkMegi aka NpcDark [672 bytes]
- (hist) Koobface botnet master KrotReal back in business, distributes ransomware and promotes BHSEO service/product [672 bytes]
- (hist) Avalanche phishers migrate to ZeuS [670 bytes]
- (hist) Smoke Bot [670 bytes]
- (hist) Fast look at an infection by a Blackhole Exploit Kit 2.0 [667 bytes]
- (hist) Reveton can speak now ! [666 bytes]
- (hist) Major shift in strategy for ZeroAccess rootkit malware, as it shifts to user-mode [666 bytes]
- (hist) Inside the Grum botnet [666 bytes]
- (hist) Xarvester, the new Srizbi? [665 bytes]
- (hist) CVE-2004-0549 [663 bytes]
- (hist) And real name of Magnitude is.... [662 bytes]
- (hist) CVE-2013-5330 (Flash) in an unknown Exploit Kit fed by high rank websites [661 bytes]
- (hist) Andromeda 2.7 features [661 bytes]
- (hist) Probing the Gozi-Prinimalka campaign [661 bytes]
- (hist) Ransomware report: the rise of BandarChor [659 bytes]
- (hist) ZeroAccess anti-debug uses debugger [659 bytes]
- (hist) Malware targeting Windows 8 uses Google Docs [658 bytes]
- (hist) Neosploit gets Java 0-Day [658 bytes]
- (hist) Analysis: Malware Win32/Rimecud.B [657 bytes]
- (hist) Stealthy router-based botnet worm squirming [653 bytes]
- (hist) Gumblar Google-poisoning attack morphs [653 bytes]
- (hist) Frutas [651 bytes]
- (hist) Hackers are increasingly targeting IoT Devices with Mirai DDoS Malware [650 bytes]
- (hist) Kovter [650 bytes]
- (hist) Source Code for IoT Botnet ‘Mirai’ Released [649 bytes]
- (hist) Lights Out: Dragonfly is on the move [649 bytes]
- (hist) Linux/Cdorked.A: New Apache backdoor being used in the wild to serve Blackhole [649 bytes]
- (hist) The DGA of Symmi [648 bytes]
- (hist) Virus scanners for virus authors [648 bytes]
- (hist) Avzahn [648 bytes]
- (hist) Panel Gendarmerie [647 bytes]
- (hist) Jigsaw [646 bytes]
- (hist) Urausy has big plan for Europe - Targeting 3 new countries among which Norway ! [644 bytes]
- (hist) PoisonIvy adapts to communicate through authentication proxies [641 bytes]
- (hist) Symantec/Android.Maistealer [641 bytes]
- (hist) Over 9 million PCs infected - ZeroAccess botnet uncovered [640 bytes]
- (hist) PokerAgent botnet stealing over 16,000 Facebook credentials [640 bytes]
- (hist) Win32/Vundo [639 bytes]
- (hist) Poison Ivy: assessing damage and extracting intelligence [637 bytes]
- (hist) Fortiguard: Android/Stiniter.A!tr [637 bytes]
- (hist) Xtreme RAT [637 bytes]
- (hist) Critroni crypto ransomware seen using Tor for command and control [636 bytes]
- (hist) Malware discovered developed with Google's "Go" programming language [635 bytes]
- (hist) Android.Counterclank found in official Android market [635 bytes]
- (hist) Botnets on discount! [633 bytes]
- (hist) Zegost [633 bytes]
- (hist) Panel Supern0va et virus gendarmerie [630 bytes]
- (hist) Kore exploit kit [629 bytes]
- (hist) ZeroAccess's way of self-deletion [628 bytes]
- (hist) Library file in certain Android apps connects to C&C servers [627 bytes]
- (hist) Buh-bye Beebone! Law enforcement kills polymorphic virus-spreading botnet [626 bytes]
- (hist) Sinowal: the evolution of MBR rootkit continues [625 bytes]
- (hist) Bleeding Life Exploit Pack [625 bytes]
- (hist) Shylock [623 bytes]
- (hist) New virus SMSZombie.A discovered by TrustGo Security Labs [622 bytes]
- (hist) Alina [621 bytes]
- (hist) Tales from Crisis, Chapter 2: Backdoor’s first steps [621 bytes]
- (hist) Citadel trojan malware analysis [619 bytes]