Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- ESET analyzes first Android file-encrypting, TOR-enabled ransomware + (June 4, 2014)
- Illuminating the Etumbot APT backdoor + (June 6, 2014)
- Symantec/W32.Zorenium + (June 16, 2014)
- Zorenium bot not half the threat it claims to be + (June 17, 2014)
- Dragonfly Threat Against Western Energy Suppliers + (June 30, 2014)
- Pushdo botnet gets DGA update, over 6,000 machines host new variant + (July 16, 2014)
- Critroni crypto ransomware seen using Tor for command and control + (July 18, 2014)
- "Crypto Ransomware" CTB-Locker (Critroni.A) on the rise + (July 18, 2014)
- Lights Out: Dragonfly is on the move + (July 21, 2014)
- New crypto-ransomware emerge in the wild + (July 31, 2014)
- IcoScript: using webmail to control malware + (August 5, 2014)
- A ScarePakage variant is targeting more countries : impersonating Europol and AFP + (August 6, 2014)
- New PoS malware “Backoff” targets US + (August 6, 2014)
- Malware analysis of the Lurk downloader + (August 7, 2014)
- The Epic Turla operation + (August 7, 2014)
- ZeroLocker won't come to your rescue + (August 18, 2014)
- Kelihos botnet trying to expand by harnessing Russian national sentiments + (August 22, 2014)
- NetTraveler APT gets a makeover for 10th birthday + (August 27, 2014)
- Poison Ivy: assessing damage and extracting intelligence + (August 30, 2014)
- Vawtrak gains momentum and expands targets + (September 3, 2014)
- The evolution of webinjects + (September 24, 2014)
- Banking trojan Dridex uses macros for infection + (November 5, 2014)