Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- CVE-2012-4681 - On its way to Sakura Exploit Kit too +
- CVE-2012-4681 - Redkit Exploit Kit - I want Porche Turbo +
- CVE-2012-4681 - Связка Sweet Orange +
- CVE-2012-5076 - Massively adopted - Blackhole update to 2.0.1 +
- Carberp gang evolution: CARO 2012 presentation +
- Carberp steals e-cash vouchers from Facebook users +
- Carberp, the renaissance ? +
- Carberp-in-the-Mobile +
- Carberp: it’s not over yet +
- Case study of the Miner botnet +
- China targets macs used by NGOs +
- Citadel : le fichier de configuration +
- Citadel V1.3.5.1: enter the fort’s dungeons +
- Citadel ZeuS bot +
- Citadel trojan malware analysis +
- Citadel trojan touts trouble-ticket system +
- Citadel: a cyber-criminal’s ultimate weapon? +
- Confidential documents from Japanese politics stolen by malware +
- Cool EK : "Hello my friend..." CVE-2012-5076 +
- Cool Exploit Kit - A new Browser Exploit Pack on the Battlefield with a "Duqu" like font drop +
- Cool exploit kit - URL structure +
- Covert channels over social networks +
- Cracking the encrypted C&C protocol of the ZeroAccess botnet +
- Crisis for Windows sneaks onto virtual machines +
- Crypto breakthrough shows Flame was designed by world-class scientists +
- Crypto experts called on to crack cyberspy tool's encryption +
- Cutwail drives spike in malicious HTML attachment spam +
- Cyber gang seeks botmasters to wage massive wave of trojan attacks against U.S. banks +
- DDoS attacks: the Zemra bot +
- DISCLOSURE: detecting botnet command and control servers through large-scale NetFlow analysis +
- DNS: a botnet dialect +
- DaRK DDoSseR leads to Gh0st RAT +
- DarkMegi rootkit - sample (distributed via Blackhole) +
- Darkmegi: this is not the Rootkit you’re looking for +
- De code van Dorifel nader bekeken +
- Digging inside Tinba malware - A walkthrough +
- Digging into the Nitol DDoS botnet +
- Dirt Jumper DDoS bot increasingly popular +
- Disttrack malware overwrites files, infects MBR +
- Disttrack sabotage malware wipes data at unnamed Middle East energy organization +
- Doctor Web a détecté un botnet enrôlant plus de 550 000 Mac +
- Doctor Web exposes 550 000 strong Mac botnet +
- Domain generation algorithms (DGA) in stealthy malware +
- Dorifel crypto malware paralyzes Dutch companies and public sector +
- Dorifel is much bigger than expected and it’s still active and growing! +
- Dorifel virus gereed voor Nederlandse banking phishing +
- Dorifel/Quervar: the support scammer’s secret weapon +
- Dorkbot: conquistando Latinoamérica +
- Dutch users served Sinowal for lunch +
- EURO Winlocker +
- Emerging attack vectors - RSA slide deck +
- Etude sur le fonctionnement du Trojan.Matsnu.1 codant les données des utilisateurs +
- Exploring the market for stolen passwords +
- FAQ on Kelihos.B/Hlux.B sinkholing +
- Fake FBI Ransomware analysis +
- Fast look at an infection by a Blackhole Exploit Kit 2.0 +
- Festi botnet analysis & investigation +
- Flame, Duqu and Stuxnet: in-depth code analysis of mssecmgr.ocx +
- Flame: replication via Windows Update MITM proxy +
- Flamer analysis: framework reconstruction +
- Flamer: highly sophisticated and discreet threat targets the Middle East +
- Flamer: urgent suicide +
- Flashfake Mac OS X botnet confirmed +
- Fortiguard: Android/Stiniter.A!tr +
- From Georgia, with love Win32/Georbot +
- From Sakura to Reveton via Smoke Bot - or a botnet distribution of Reveton +
- Full analysis of Flame's Command & Control servers +
- Full analysis of Flame's command & control servers +
- Gangstaservice Winlock Affiliate +
- Gauss: Nation-state cyber-surveillance meets banking Trojan +
- Gauss: abnormal distribution +
- Get gamed and rue the day... +
- Getting more "personal" & deeper into Cridex with parfeit credential stealer infection +
- Gimemo finally targeting USA with Camera Feature too +
- Gimemo wants to play in the big league +
- Guys behind Gauss and Flame are the same +
- Harvesting data on the Xarvester botmaster +
- HerpesNet botnet 1.7 +
- IRC bot for Android +
- Industrial espionage and targeted attacks: understanding the characteristics of an escalating threat +
- Inside Andromeda Bot v2.06 Webpanel / AKA Gamarue - Botnet Control Panel +
- Inside Blackhole Exploits Kit v1.2.4 - Exploit Kit Control Panel +
- Inside Citadel 1.3.4.5 C&C & Builder - Botnet Control Panel +
- Inside Impact exploit kit +
- Inside Pony 1.7 / Fareit C&C - Botnet Control Panel +
- Inside Smoke Bot - Botnet Control Panel +
- Inside Smoke Bot - botnet control panel +
- Inside Ulocker +
- Inside Upas Kit (1.0.1.1) aka Rombrast C&C - Botnet Control Panel +
- Inside an APT campaign with multiple targets in India and Japan +
- Inside the Grum botnet +
- Inside view of Lyposit aka (for its friends) Lucky LOCKER +
- Insights into Win32/Bradop +
- Interconnection of Gauss with Stuxnet, Duqu & Flame +
- Introducing Ponmocup-Finder +
- It’s 2012 and Armageddon has arrived +
- It’s not the end of the world: DarkComet misses by a mile +
- Java Runtime Environment 1.7 Zero-Day Exploit Delivers Backdoor +
- Java Zero-Days and the Blackhole Exploit Kit +
- Joint strike force against Dorifel +