Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- Post-mortem of a zombie: Conficker cleanup after six years + (11:49:50, 25 August 2015)
- Hadi Asghari + (11:50:29, 25 August 2015)
- Michael Ciere + (11:50:43, 25 August 2015)
- Michel J.G. van Eeten + (11:50:56, 25 August 2015)
- Joe Blackbird + (12:57:35, 25 August 2015)
- Microsoft Malware Protection Centre + (12:58:29, 25 August 2015)
- Matt McCormack + (12:58:42, 25 August 2015)
- Office of Naval Research + (12:59:16, 25 August 2015)
- SIRv12: the obstinacy of Conficker + (13:00:07, 25 August 2015)
- Neutrino + (15:24:07, 27 August 2015)
- CVE-2015-2419 + (15:24:54, 27 August 2015)
- Contagio + (15:25:36, 27 August 2015)
- DarkMegi rootkit - sample (distributed via Blackhole) + (15:27:52, 27 August 2015)
- Analysis of DarkMegi aka NpcDark + (15:37:56, 27 August 2015)
- DarkMegi + (15:38:56, 27 August 2015)
- Property:Architecture + (21:59:06, 29 August 2015)
- Benjamin Vanheuverzwijn + (08:49:28, 31 August 2015)
- Sality + (08:54:53, 31 August 2015)
- Hébergeurs malhonnêtes : nouvelle fermeture (3FN) + (19:26:19, 7 September 2015)
- Conficker working group: lessons learned + (20:54:44, 7 September 2015)
- Watch out for CoreBot, new stealer in the wild + (12:54:55, 12 September 2015)
- Limor Kessem + (12:57:14, 12 September 2015)
- Martin Korman + (12:57:32, 12 September 2015)
- An overnight sensation — CoreBot returns as a full-fledged financial malware + (13:00:10, 12 September 2015)
- CoreBot + (13:02:46, 12 September 2015)
- Security Intelligence + (13:03:12, 12 September 2015)
- CoinVault + (08:24:39, 2 October 2015)
- Simda + (10:02:09, 2 October 2015)
- Spartan + (19:12:44, 12 November 2015)
- Pony + (19:13:25, 12 November 2015)
- CVE-2015-7645 + (19:15:14, 12 November 2015)
- Police lock + (10:53:48, 21 November 2015)
- File:Flag of Peru.svg + (11:04:30, 21 November 2015)
- Landings FR + (11:07:18, 21 November 2015)
- GlassRAT + (22:26:56, 24 November 2015)
- ModPOS + (17:59:25, 25 November 2015)
- Cryptowall + (08:41:47, 4 December 2015)
- APT28 + (21:57:43, 15 January 2016)
- CTB-Locker is back: the web server edition + (23:34:28, 1 March 2016)
- Ido Naor + (23:35:02, 1 March 2016)
- Andrey Rassokhin + (20:12:13, 6 March 2016)
- Dmitry Oleksyuk + (20:13:36, 6 March 2016)
- Esage Lab + (20:14:21, 6 March 2016)
- Power Bot + (20:17:22, 6 March 2016)
- TeslaCrypt + (12:28:39, 12 March 2016)
- Locky + (12:29:14, 12 March 2016)
- Nemucod + (12:30:18, 12 March 2016)
- PlugX malware: A good hacker is an apologetic hacker + (13:06:22, 12 March 2016)
- 2016 + (13:06:51, 12 March 2016)
- Dmitry Tarakanov + (13:07:50, 12 March 2016)
- Kaspersky Securelist + (13:08:35, 12 March 2016)
- File:Bouton campaign.png + (13:14:11, 12 March 2016)
- Dmitry Bestuzhev + (13:20:10, 12 March 2016)
- First step in cross-platform Trojan bankers from Brazil done + (13:21:55, 12 March 2016)
- Brazil + (13:22:15, 12 March 2016)
- Attack on Zygote: a new twist in the evolution of mobile threats + (13:28:48, 12 March 2016)
- Triada + (13:29:23, 12 March 2016)
- Nikita Buchka + (13:29:40, 12 March 2016)
- CryptoLocker + (11:10:14, 18 March 2016)
- Microsoft security updates January 2016 + (09:37:48, 19 March 2016)
- CVE-2016-0034 + (09:38:43, 19 March 2016)
- Kurt Baumgartner + (09:39:44, 19 March 2016)
- Social networks – A bonanza for cybercriminals + (09:46:10, 19 March 2016)
- VKontakte + (09:47:44, 19 March 2016)
- Instagram + (09:47:50, 19 March 2016)
- Ruslan Stoyanov + (09:49:40, 19 March 2016)
- ZeuS ransomware feature: win unlock + (09:52:09, 19 March 2016)
- Tis the season for shipping and phishing + (09:54:55, 19 March 2016)
- Andrey Kostin + (09:56:27, 19 March 2016)
- DHL + (09:57:05, 19 March 2016)
- Social networks + (09:57:43, 19 March 2016)
- FedEx + (09:58:31, 19 March 2016)
- You can’t be invulnerable, but you can be well protected + (10:06:58, 19 March 2016)
- CVE-2015-1701 + (10:09:01, 19 March 2016)
- Vyacheslav Zakorzhevsky + (10:09:42, 19 March 2016)
- CVE-2015-3090 + (10:11:30, 19 March 2016)
- CVE-2015-3104 + (10:12:16, 19 March 2016)
- CVE-2015-3105 + (10:13:29, 19 March 2016)
- CVE-2015-5560 + (10:14:46, 19 March 2016)
- CVE-2012-0158 + (10:15:26, 19 March 2016)
- Dyre Banking Trojan + (10:17:33, 19 March 2016)
- Denis Makrushin + (10:20:45, 19 March 2016)
- Maria Garnaeva + (10:20:49, 19 March 2016)
- Anton Ivanov + (10:22:48, 19 March 2016)
- Jornt van der Wiel + (10:25:21, 19 March 2016)
- Yury Namestnikov + (10:25:38, 19 March 2016)
- FakeToken + (10:37:29, 19 March 2016)
- McAfee Labs + (10:37:46, 19 March 2016)
- Carlos Castillo + (10:38:22, 19 March 2016)
- Android malware pairs man-in-the-middle with remote-controlled banking trojan + (10:38:52, 19 March 2016)
- Kaspersky security bulletin 2015. Overall statistics for 2015 + (10:39:32, 19 March 2016)
- Trojan ChePro, the CPL storm + (10:45:43, 19 March 2016)
- ChePro + (10:46:42, 19 March 2016)
- .CPL + (10:47:30, 19 March 2016)
- Fabio Assolini + (10:47:56, 19 March 2016)
- Marcher + (10:53:50, 19 March 2016)
- Android Marcher now marching via porn sites + (10:56:08, 19 March 2016)
- Zscaler + (10:56:25, 19 March 2016)
- Property:Target + (11:03:00, 19 March 2016)
- Category:Vulnerability packages + (11:03:16, 19 March 2016)
- CVE-2015-1539 + (11:10:50, 19 March 2016)
- CVE-2015-1538 + (11:14:45, 19 March 2016)
- CVE-2015-3824 + (11:23:04, 19 March 2016)
- CVE-2015-3827 + (11:27:59, 19 March 2016)
- CVE-2015-3829 + (11:29:31, 19 March 2016)
- CVE-2015-3828 + (11:30:35, 19 March 2016)
- CVE-2015-3826 + (11:32:07, 19 March 2016)
- Property:Cve + (11:34:26, 19 March 2016)
- Stagefright + (11:35:21, 19 March 2016)
- Cryakl + (12:08:21, 19 March 2016)
- Shade + (12:10:33, 19 March 2016)
- Scatter + (12:11:12, 19 March 2016)
- Trojan downloaders on the rise: don’t let Locky or TeslaCrypt ruin your day + (21:39:34, 19 March 2016)
- Josep Albors + (21:40:58, 19 March 2016)
- ESET Welivesecurity + (21:41:43, 19 March 2016)
- Anton Cherepanov + (21:42:20, 19 March 2016)
- Bharat Jogi + (21:16:39, 21 March 2016)
- Microsoft + (21:19:49, 21 March 2016)
- T.J. Campana + (21:21:48, 21 March 2016)
- FireEye + (21:22:16, 21 March 2016)
- Ali Islam + (21:23:12, 21 March 2016)
- Gauss: abnormal distribution + (21:24:23, 21 March 2016)
- GReAT + (21:24:38, 21 March 2016)
- Disttrack sabotage malware wipes data at unnamed Middle East energy organization + (21:27:13, 21 March 2016)
- Wired Business Media + (21:30:23, 21 March 2016)
- Brian Prince + (21:47:22, 21 March 2016)
- Sophos Labs + (21:53:22, 21 March 2016)
- James Wyke + (21:57:59, 21 March 2016)
- André M. DiMino + (22:25:25, 21 March 2016)
- Hendrik Adrian + (22:28:23, 21 March 2016)
- Akbot (bot) + (22:29:26, 21 March 2016)
- University of Pennsylvania + (22:30:06, 21 March 2016)
- McAfee Labs threat advisory : W32.Pinkslipbot + (22:32:28, 21 March 2016)
- Fortinet + (22:35:31, 21 March 2016)
- Kyle Yang + (22:37:56, 21 March 2016)
- François Paget + (22:38:27, 21 March 2016)
- Prosenjit Sinha + (22:38:58, 21 March 2016)
- The graphic design of "Maktub Locker" ransomware + (09:27:05, 23 March 2016)
- Encrypt without C&C connection + (09:29:16, 23 March 2016)
- Maktub Locker + (09:39:16, 23 March 2016)
- Coverton + (14:17:56, 27 March 2016)
- PETYA crypto-ransomware overwrites MBR to lock users out of their computers + (20:57:15, 27 March 2016)
- TrendLabs Security Intelligence Blog + (20:57:42, 27 March 2016)
- Jasen Sumalapao + (20:57:53, 27 March 2016)
- MBR overwrite + (21:08:06, 27 March 2016)
- Encrypt MFT + (21:08:35, 27 March 2016)
- Petya ransomware skips the files and encrypts your hard drive instead + (21:12:03, 27 March 2016)
- Bleeping Computer + (21:12:26, 27 March 2016)
- Lawrence Abrams + (21:12:37, 27 March 2016)
- CryptoDefense and How Decrypt ransomware information guide and FAQ + (21:14:23, 27 March 2016)
- CryptoDefense + (21:15:16, 27 March 2016)
- Petya + (21:19:29, 27 March 2016)
- TreasureHunt: a custom POS malware tool + (15:23:25, 28 March 2016)
- TreasureHunt + (15:27:16, 28 March 2016)
- FrameworkPOS + (12:32:26, 16 April 2016)
- Luis Mendieta + (12:35:56, 16 April 2016)
- Three month FrameworkPOS malware campaign nabs ~43,000 credit cards from point of sale systems + (12:37:17, 16 April 2016)
- Launch delay + (19:34:10, 19 April 2016)
- Monitor mouse events + (19:34:36, 19 April 2016)
- Check CPU name in registry + (19:34:50, 19 April 2016)
- Delphi + (19:35:58, 19 April 2016)
- Bedep + (19:41:42, 19 April 2016)
- Proofpoint + (19:42:33, 19 April 2016)
- Property:Botnetstring + (20:27:09, 19 April 2016)
- CryptXXX + (20:27:47, 19 April 2016)
- CryptXXX: new ransomware from the actors behind Reveton, dropping via Angler + (20:34:35, 19 April 2016)
- CryptProjectXXX + (20:37:23, 19 April 2016)
- Category:Strings + (20:37:57, 19 April 2016)
- Erase files + (07:50:28, 1 May 2016)
- Jigsaw + (08:00:35, 1 May 2016)
- New crypto-ransomware JIGSAW plays nasty games + (08:03:02, 1 May 2016)
- AbaddonPOS + (13:48:07, 14 May 2016)
- AbaddonPOS: A new point of sale threat linked to Vawtrak + (13:52:43, 14 May 2016)
- Darien Huss + (13:53:18, 14 May 2016)
- Coinbitclip + (12:22:36, 28 June 2016)
- Source Code for IoT Botnet ‘Mirai’ Released + (17:45:52, 22 October 2016)
- Bashlight + (17:46:49, 22 October 2016)
- IoT + (17:52:42, 22 October 2016)
- GRE flood + (17:54:43, 22 October 2016)
- Anna-senpai + (18:02:18, 22 October 2016)
- Category:Person + (18:02:55, 22 October 2016)
- Krebs on Security + (18:04:02, 22 October 2016)
- MMD-0056-2016 - Linux/Mirai, how an old ELF malcode is recycled + (18:08:48, 22 October 2016)
- Hackers are increasingly targeting IoT Devices with Mirai DDoS Malware + (09:58:15, 30 October 2016)
- XiongMai Technologies + (09:59:27, 30 October 2016)
- C + (10:00:57, 30 October 2016)
- Go + (10:01:12, 30 October 2016)
- AVTECH + (10:01:54, 30 October 2016)
- Dahua Technology + (10:02:54, 30 October 2016)
- HackRead + (10:03:36, 30 October 2016)
- Waqas Amir + (10:05:13, 30 October 2016)
- Mirai + (10:09:51, 30 October 2016)
- Motorola 68000 + (10:12:14, 30 October 2016)
- Category:CPU + (10:12:34, 30 October 2016)
- Trustwave + (10:14:29, 30 October 2016)
- Landings DE + (10:19:13, 30 October 2016)
- File:Flag of Germany.svg + (10:35:05, 30 October 2016)
- File:Flag of France.svg + (10:41:07, 30 October 2016)
- File:Flag placeholder.svg + (10:49:21, 30 October 2016)
- Updated Sundown Exploit Kit Uses Steganography + (13:27:58, 1 January 2017)
- Zeus variant Floki bot targets PoS data + (21:48:46, 3 January 2017)
- Floki + (21:51:19, 3 January 2017)
- Point-of-sale terminals + (21:52:47, 3 January 2017)
- GootKit + (15:54:59, 26 January 2017)
- Sage + (21:12:15, 3 February 2017)
- ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar + (13:55:00, 18 February 2017)
- ViperRAT + (13:57:13, 18 February 2017)
- Michael Flossman + (13:57:24, 18 February 2017)
- Israeli Defence Force + (13:58:04, 18 February 2017)
- 2017 + (13:59:55, 18 February 2017)
- Cerber Dominates Ransomware Landscape After Locky's Demise + (09:36:22, 16 April 2017)
- Catalin Cimpanu + (09:36:52, 16 April 2017)
- As-a-service + (09:39:00, 16 April 2017)
- Cerber + (09:40:10, 16 April 2017)
- .cerber + (09:40:31, 16 April 2017)
- Category:File extension + (09:41:47, 16 April 2017)
- Japan + (07:10:15, 9 August 2017)
- Shifu + (07:11:30, 9 August 2017)
- Where Are They Today? Cybercrime Trojans That No One Misses: Shifu Malware + (07:14:12, 9 August 2017)
- Lukitus + (16:24:03, 23 August 2017)
- .lukitus + (16:24:27, 23 August 2017)
- Locky Ransomware switches to the Lukitus extension for Encrypted Files + (16:27:38, 23 August 2017)
- CVE-2017-5715 + (22:38:49, 3 January 2018)
- Intel CPUs + (22:39:28, 3 January 2018)
- APT15 + (14:05:19, 10 March 2018)
- TinyNuke + (14:43:02, 17 April 2018)
- TinyNuke may be a ticking time bomb + (18:52:08, 17 April 2018)
- SamSam Ransomware Evolves Its Tactics Towards Targeting Whole Companies + (15:36:11, 1 May 2018)
- SamSam + (15:36:33, 1 May 2018)
- Tara Seals + (15:37:13, 1 May 2018)
- 2018 + (15:39:52, 1 May 2018)
- Threatpost + (15:40:22, 1 May 2018)
- Dennis Fisher + (15:40:33, 1 May 2018)
- SamSam ransomware designed to inundate targeted networks with thousands of copies of itself + (15:44:28, 1 May 2018)
- SC Magazine + (15:44:53, 1 May 2018)
- Bradley Barth + (15:45:03, 1 May 2018)
- TCP/2541 + (15:17:57, 17 July 2018)
- Revenge RAT + (15:23:20, 17 July 2018)
- GandCrab + (12:59:16, 18 July 2018)
- GandCrab ransomware distributed by RIG and GrandSoft exploit kits + (13:03:42, 18 July 2018)
- Malwarebytes + (13:04:07, 18 July 2018)
- Jérôme Segura + (13:04:39, 18 July 2018)
- Vasilios Hioueras + (13:04:56, 18 July 2018)
- Ransomware or Wiper? LockerGoga Straddles the Line + (09:10:09, 23 March 2019)
- Ransomware : la sulfureuse hypothèse sur la situation chez Norsk Hydro + (09:17:09, 23 March 2019)
- Norsk Hydro + (09:17:57, 23 March 2019)
- Nick Biasini + (09:18:10, 23 March 2019)
- 2019 + (09:28:12, 23 March 2019)
- Altran + (09:28:47, 23 March 2019)
- How Lockergoga took down Hydro — ransomware used in targeted attacks aimed at big business + (09:33:45, 23 March 2019)
- LockerGoga + (09:47:48, 23 March 2019)