Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- Legal implications of countering botnets + (14:28:33, 7 February 2015)
- Static analysis of Dalvik bytecode and reflection in Android + (14:28:33, 7 February 2015)
- Proactive detection of security incidents II - Honeypots + (14:28:41, 7 February 2015)
- Meet ProPack Exploit Pack - yes that's a lot of pack + (14:28:47, 7 February 2015)
- CVE-2012-5076 - Massively adopted - Blackhole update to 2.0.1 + (14:28:51, 7 February 2015)
- Koobface botnet master KrotReal back in business, distributes ransomware and promotes BHSEO service/product + (14:29:07, 7 February 2015)
- Mpack installs ultra-invisible trojan + (14:29:09, 7 February 2015)
- TDSS botnet: full disclosure + (14:29:11, 7 February 2015)
- Festi botnet analysis & investigation + (14:29:12, 7 February 2015)
- Study of malware obfuscation techniques + (14:29:16, 7 February 2015)
- Getting more "personal" & deeper into Cridex with parfeit credential stealer infection + (14:29:16, 7 February 2015)
- Win32/Spy.Ranbyus modifying Java code in RBS Ukraine systems + (14:29:17, 7 February 2015)
- Malicious Apache module used for content injection: Linux/Chapro.A + (14:29:18, 7 February 2015)
- Android trojan used to create simple SMS spam botnet + (14:29:19, 7 February 2015)
- Malicious Apache module injects Iframes + (14:29:19, 7 February 2015)
- Security alert: SpamSoldier + (14:29:20, 7 February 2015)
- The Pobelka botnet - a command and control case study + (14:29:21, 7 February 2015)
- Under the hood of the cyber attack on U.S. banks + (14:29:27, 7 February 2015)
- Inside the world of the Citadel trojan + (14:29:30, 7 February 2015)
- PokerAgent botnet stealing over 16,000 Facebook credentials + (14:29:32, 7 February 2015)
- Got malware? Rent an exploit service + (14:29:32, 7 February 2015)
- ‘Dexter’ virus targets point-of-sale terminals + (14:29:33, 7 February 2015)
- Kelihos botnet appears again with new variant + (14:29:35, 7 February 2015)
- Miniduke + (14:29:43, 7 February 2015)
- Kelihos is dead… No wait… Long live Kelihos! Again! + (14:29:45, 7 February 2015)
- The life cycle of web server botnet recruitment + (14:29:45, 7 February 2015)
- Discovered: botnet costing display advertisers over six million dollars per month + (14:29:48, 7 February 2015)
- Unveiling an Indian cyberattack infrastructure - a special report + (14:29:54, 7 February 2015)
- OSX Kitmos analysis + (14:29:56, 7 February 2015)
- Mac BackDoor.Wirenet.1 config extractor + (14:30:03, 7 February 2015)
- Poison Ivy 2.3.0 Documentation + (14:30:05, 7 February 2015)
- Chapro.A source code + (14:30:06, 7 February 2015)
- The ZeroAccess botnet revealed + (14:30:08, 7 February 2015)
- Analysis: Malware Win32/Rimecud.B + (14:30:08, 7 February 2015)
- Look what I found: it's a Pony! + (14:30:09, 7 February 2015)
- PeerRush: mining for unwanted P2P traffic + (14:30:10, 7 February 2015)
- Learning stateful models for network honeypots + (14:30:17, 7 February 2015)
- Survey on network-based botnet detection methods + (14:30:18, 7 February 2015)
- Win32/64:Napolar: New trojan shines on the cyber crime-scene + (14:30:19, 7 February 2015)
- Qadars: un nouveau malware bancaire avec un composant mobile + (14:30:19, 7 February 2015)
- Mariposa botnet 'mastermind' jailed in Slovenia + (14:30:20, 7 February 2015)
- MSIE 0-day exploit CVE-2014-0322 - Possibly targeting French aerospace association + (14:30:25, 7 February 2015)
- Andromeda 2.7 features + (14:30:30, 7 February 2015)
- “Nemanja” botnet identified by IntelCrawler – Over a thousand point-of-sales, grocery management and accounting systems are compromised all over the world + (14:30:31, 7 February 2015)
- RIG exploit kit strikes oil + (14:30:33, 7 February 2015)
- Uroburos: the snake rootkit + (14:30:39, 7 February 2015)
- Symantec/Android.Ackposts + (14:30:42, 7 February 2015)
- New Xtreme RAT attacks US, Israel, and other foreign governments + (16:54:53, 7 February 2015)
- Full analysis of Flame's command & control servers + (16:56:49, 7 February 2015)
- Shamoon the Wiper: further details (Part II) + (16:57:03, 7 February 2015)
- Full analysis of Flame's Command & Control servers + (16:57:13, 7 February 2015)
- Adobe Flash Player 0-day and HackingTeam's Remote Control System + (16:57:23, 7 February 2015)
- The mystery of Duqu framework solved + (16:57:23, 7 February 2015)
- Flame: replication via Windows Update MITM proxy + (16:57:28, 7 February 2015)
- Carberp-in-the-Mobile + (16:57:40, 7 February 2015)
- The Flame: questions and answers + (16:57:53, 7 February 2015)
- The mystery of Duqu: part three + (16:57:58, 7 February 2015)
- Flashfake Mac OS X botnet confirmed + (16:58:02, 7 February 2015)
- Gauss: Nation-state cyber-surveillance meets banking Trojan + (16:58:04, 7 February 2015)
- Botnet shutdown success story - again: disabling the new Hlux/Kelihos botnet + (16:58:05, 7 February 2015)
- The most sophisticated Android trojan + (16:58:05, 7 February 2015)
- The MiniDuke mystery: PDF 0-day government spy assembler 0x29A micro backdoor + (16:58:07, 7 February 2015)
- Kelihos/Hlux botnet returns with new techniques + (16:58:13, 7 February 2015)
- The mystery of Duqu: part two + (16:58:24, 7 February 2015)
- Madi is back - New Tricks and a new Command&Control server + (16:58:56, 7 February 2015)
- Ransomware Casier - Sharing Design with Lyposit - Gaelic & Persian ( + (16:59:39, 7 February 2015)
- Inside Styx exploit kit control panel + (16:59:59, 7 February 2015)
- The where and why of Hlux + (17:00:01, 7 February 2015)
- Meet CritXPack (Previously Vintage Pack) + (17:00:05, 7 February 2015)
- Reveton Autumn Collection += AU,CZ, IE, NO & 17 new design + (17:00:05, 7 February 2015)
- Behind the Captcha or Inside Blackhole Exploit Kit 2.0 - Exploit Kit Administration Panel + (17:00:08, 7 February 2015)
- Cool Exploit Kit - A new Browser Exploit Pack on the Battlefield with a "Duqu" like font drop + (17:00:08, 7 February 2015)
- CVE-2013-5330 (Flash) in an unknown Exploit Kit fed by high rank websites + (17:00:12, 7 February 2015)
- Reveton += HU, LV, SK, SI, TR (!), RO - So spreading accross Europe with 6 new Design + (17:00:21, 7 February 2015)
- Urausy improving its localization - A (the\?) Gaelic Ransomware with Interpol impersonation as default landing + (17:00:26, 7 February 2015)
- Update to Citadel : 1.3.5.1 Rain Edition. + (17:00:30, 7 February 2015)
- Fast look at an infection by a Blackhole Exploit Kit 2.0 + (17:00:31, 7 February 2015)
- From Sakura to Reveton via Smoke Bot - or a botnet distribution of Reveton + (17:00:34, 7 February 2015)
- Gimemo finally targeting USA with Camera Feature too + (17:00:41, 7 February 2015)
- CVE-2012-4681 - Связка Sweet Orange + (17:00:44, 7 February 2015)
- Reversing Andromeda-Gamarue botnet + (17:00:49, 7 February 2015)
- Urausy: Colorfull design refresh (+HR) & EC3 Logo + (17:00:50, 7 February 2015)
- Urausy has big plan for Europe - Targeting 3 new countries among which Norway ! + (17:00:52, 7 February 2015)
- The Madi campaign - Part II + (17:02:03, 7 February 2015)
- The mystery of Duqu: part five + (17:02:05, 7 February 2015)
- Duqu FAQ + (17:02:15, 7 February 2015)
- Carberp, the renaissance ? + (17:02:26, 7 February 2015)
- Inside Blackhole Exploits Kit v1.2.4 - Exploit Kit Control Panel + (17:02:30, 7 February 2015)
- Inside Upas Kit (1.0.1.1) aka Rombrast C&C - Botnet Control Panel + (17:02:37, 7 February 2015)
- Stamp EK (aka SofosFO) now showing "Blackhole 2.0 Like" landing pages + (17:02:40, 7 February 2015)
- Update to Citadel : v.1.3.4.5 + (17:03:02, 7 February 2015)
- CVE-2013-1493 (jre17u15 - jre16u41) integrating exploit kits + (17:03:18, 7 February 2015)
- Urausy ransomware - July 2013 design refresh - "Summer 2013 collection" + (17:03:20, 7 February 2015)
- Ransom.II - UGC payment for USA - Windows Genuine impersonation for DE + (17:03:25, 7 February 2015)
- Cool EK : "Hello my friend..." CVE-2012-5076 + (17:03:28, 7 February 2015)
- Inside view of Lyposit aka (for its friends) Lucky LOCKER + (17:03:35, 7 February 2015)
- Ransomware : Smile you're on camera - Reveton.C new landing pages + (17:03:46, 7 February 2015)
- Encyclopedia entry: Win32/Oderoor + (17:04:18, 7 February 2015)
- Botnet shutdown success story: how Kaspersky Lab disabled the Hlux/Kelihos botnet + (17:04:29, 7 February 2015)
- Inside Smoke Bot - Botnet Control Panel + (17:04:31, 7 February 2015)
- Upas Kit (aka Rombrast) integrates webinjects + (17:05:24, 7 February 2015)
- Inside Andromeda Bot v2.06 Webpanel / AKA Gamarue - Botnet Control Panel + (17:05:31, 7 February 2015)