Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- Crypto experts called on to crack cyberspy tool's encryption + (August 14, 2012)
- What’s the buzz with Bafruz + (August 14, 2012)
- ZACCESS/SIREFEF arrives with new infection technique + (August 14, 2012)
- Interconnection of Gauss with Stuxnet, Duqu & Flame + (August 15, 2012)
- Malware analysis tutorial 32: exploration of botnet client + (August 15, 2012)
- Analyzing a new exploit pack + (August 15, 2012)
- New virus SMSZombie.A discovered by TrustGo Security Labs + (August 15, 2012)
- Spam botnets: The fall of Grum and the rise of Festi + (August 16, 2012)
- Disttrack sabotage malware wipes data at unnamed Middle East energy organization + (August 16, 2012)
- Shamoon the wiper - copycats at work + (August 16, 2012)
- Saudi Aramco hit by computer virus + (August 16, 2012)
- W32.Changeup: how the worm was created + (August 16, 2012)
- Inside Upas Kit (1.0.1.1) aka Rombrast C&C - Botnet Control Panel + (August 16, 2012)
- Targeted destructive malware explained: Troj/Mdrop-ELD + (August 17, 2012)
- Disttrack malware overwrites files, infects MBR + (August 17, 2012)
- Necurs Quick Analysis + (August 17, 2012)
- Ransom.II - UGC payment for USA - Windows Genuine impersonation for DE + (August 18, 2012)
- Crisis for Windows sneaks onto virtual machines + (August 20, 2012)
- Tales from Crisis, Chapter 2: Backdoor’s first steps + (August 20, 2012)
- The “Hikit” rootkit: advanced and persistent attack techniques (part 1) + (August 20, 2012)
- Shamoon the Wiper in details + (August 21, 2012)
- Quervar – Induc.C reincarnate + (August 21, 2012)
- Tales from Crisis, Chapter 3: The Italian rootkit job + (August 21, 2012)
- Newly detected Crisis virus infects Windows, Macs and virtual machines + (August 22, 2012)
- An analysis of the cross-platform backdoor NetWeirdRC + (August 22, 2012)
- The “Hikit” rootkit: advanced and persistent attack techniques (part 2) + (August 22, 2012)
- The first trojan in history to steal Linux and Mac OS X passwords + (August 22, 2012)
- Guys behind Gauss and Flame are the same + (August 23, 2012)
- Apple zombie malware 'NetWeird' rummages for browser and email passwords + (August 24, 2012)
- Tales from Crisis, Chapter 4: a ghost in the network + (August 26, 2012)
- What was that Wiper thing? + (August 29, 2012)
- Mahdi malware finds 150 new targets including U.S. and Germany, gets more evasive + (August 29, 2012)
- New Mahdi updates, new C2 server + (August 29, 2012)
- CVE-2012-4681 - On its way to Sakura Exploit Kit too + (August 29, 2012)
- Inside Ulocker + (August 30, 2012)
- CVE-2012-4681 - Redkit Exploit Kit - I want Porche Turbo + (August 30, 2012)
- CVE-2012-4681 - Связка Sweet Orange + (August 30, 2012)
- Mac BackDoor.Wirenet.1 config extractor + (August 30, 2012)
- The ZeroAccess botnet: mining and fraud for massive financial gain + (September 2012)
- Neosploit gets Java 0-Day + (September 1, 2012)
- From Sakura to Reveton via Smoke Bot - or a botnet distribution of Reveton + (September 2012)
- Virus Gendarmerie : variante Office Centrale de Luttre contre la criminalité – controle informationnel + (September 3, 2012)
- Panel Gendarmerie + (September 3, 2012)
- Weelsof use SSL C&C + (September 3, 2012)
- Karagny.L unpack + (September 4, 2012)
- Tatanga attack exposes chipTAN weaknesses + (September 4, 2012)
- PlugX: new tool for a not so new campaign + (September 10, 2012)
- Malicious Apache module injects Iframes + (September 10, 2012)
- Botnet command server hidden in Tor + (September 10, 2012)
- MSRT September '12 - Medfos, hijacking your daily search + (18:13:00, 10 September 2012)
- MoVP 1.3 Desktops, heaps, and ransomware + (September 12, 2012)
- Fast look at an infection by a Blackhole Exploit Kit 2.0 + (September 13, 2012)
- Microsoft disrupts the emerging Nitol botnet being spread through an unsecure supply chain + (September 13, 2012)
- Citadel trojan malware analysis + (September 14, 2012)
- Urausy improving its localization - A (the\?) Gaelic Ransomware with Interpol impersonation as default landing + (September 15, 2012)
- Full analysis of Flame's Command & Control servers + (September 17, 2012)
- The Mirage campaign + (September 18, 2012)
- Malware Uses Google Go Language + (September 18, 2012)
- Ransomware Casier - Sharing Design with Lyposit - Gaelic & Persian ( + (September 19, 2012)
- OSX/Flashback - The first malware to infect hundreds of thousands of Apple Mac + (September 19, 2012)
- NGRBot spreads via chat + (September 20, 2012)
- Malware discovered developed with Google's "Go" programming language + (September 22, 2012)
- Urausy has big plan for Europe - Targeting 3 new countries among which Norway ! + (September 22, 2012)
- Behind the Captcha or Inside Blackhole Exploit Kit 2.0 - Exploit Kit Administration Panel + (September 23, 2012)
- Analysis of Ysreef (a variant of Tobfy) + (September 25, 2012)
- ZeuS Gameover overview + (September 25, 2012)
- Java Runtime Environment 1.7 Zero-Day Exploit Delivers Backdoor + (September 28, 2012)
- Blackhole & Cridex: season 2 episode 1: Intuit spam & SSL traffic analysis + (October 4, 2012)
- Cyber gang seeks botmasters to wage massive wave of trojan attacks against U.S. banks + (October 4, 2012)
- Update to Citadel : 1.3.5.1 Rain Edition. + (October 4, 2012)
- More details of the Dorifel servers + (October 8, 2012)
- New ransomware plays its victims an audio file, over and over and over… + (October 8, 2012)
- TDI - a new element in old TDSS story + (October 8, 2012)
- ‘Project Blitzkrieg’ promises more aggressive cyberheists against U.S. banks + (October 8, 2012)
- Cool Exploit Kit - A new Browser Exploit Pack on the Battlefield with a "Duqu" like font drop + (October 9, 2012)
- BoteAR: a “social botnet”- What are we talking about + (October 11, 2012)
- Study of malware obfuscation techniques + (October 11, 2012)
- Reveton Autumn Collection += AU,CZ, IE, NO & 17 new design + (October 12, 2012)
- An overview of exploit packs + (October 12, 2012)
- The Dorkbot rises + (October 16, 2012)
- Sopelka Botnet: three banking trojans and one banking panel + (October 17, 2012)
- Citadel V1.3.5.1: enter the fort’s dungeons + (October 18, 2012)
- Olmasco bootkit: next circle of TDL4 evolution (or not) + (October 18, 2012)
- Stamp EK (aka SofosFO) now showing "Blackhole 2.0 Like" landing pages + (October 18, 2012)
- Blackhole exploit kit v2 on the rise + (October 19, 2012)
- Analysis of TDL4 + (October 20, 2012)
- Trojan.Prinimalka: bits and pieces + (October 29, 2012)
- Reveton += HU, LV, SK, SI, TR (!), RO - So spreading accross Europe with 6 new Design + (October 29, 2012)
- Analysis of a “/0” stealth scan from a botnet + (November 2012)
- Citadel: a cyber-criminal’s ultimate weapon? + (November 5, 2012)
- DaRK DDoSseR leads to Gh0st RAT + (November 8, 2012)
- Cool EK : "Hello my friend..." CVE-2012-5076 + (November 9, 2012)
- Meet CritXPack (Previously Vintage Pack) + (November 12, 2012)
- Probing the Gozi-Prinimalka campaign + (November 13, 2012)
- Festi botnet analysis & investigation + (November 13, 2012)
- New Xtreme RAT attacks US, Israel, and other foreign governments + (November 14, 2012)
- 1940 IPs for a BHEK/ULocker server - Nexcess-Net + (November 14, 2012)
- Malware targeting Windows 8 uses Google Docs + (November 17, 2012)
- Cool exploit kit - URL structure + (November 17, 2012)
- An analysis of Dorkbot’s infection vectors (part 2) + (November 21, 2012)
- Proactive detection of security incidents II - Honeypots + (November 22, 2012)
- Reveton can speak now ! + (November 23, 2012)