Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- "Crypto Ransomware" CTB-Locker (Critroni.A) on the rise +
- "NetTraveler is Running!" - Red Star APT attacks compromise high-profile victims +
- A ScarePakage variant is targeting more countries : impersonating Europol and AFP +
- A peek inside the PickPocket botnet +
- APT1: technical backstage +
- AbaddonPOS: A new point of sale threat linked to Vawtrak +
- Adobe Flash Player 0-day and HackingTeam's Remote Control System +
- Adrenalin botnet. The trend marks the Russian crimeware +
- Advancing the fight against botnets with consumer notifications +
- Alina: casting a shadow on POS +
- Alina: following the shadow part 1 +
- Alina: following the shadow part 2 +
- An encounter with trojan Nap +
- An overnight sensation — CoreBot returns as a full-fledged financial malware +
- An overview of messaging botnets +
- Analyse et poncage du botnet HerpesNet +
- Analyse of the sample cdorked.A +
- Analysis of DarkMegi aka NpcDark +
- Analysis of a VBScript bot +
- Analysis of the malware of Red October - Part 1 +
- Analysis of the malware of Red October - Part 2 +
- Analysis: Malware Win32/Rimecud.B +
- Analyzing a new exploit pack +
- And real name of Magnitude is.... +
- Android Marcher now marching via porn sites +
- Android RATs branch out with Dendroid +
- Android trojan used to create simple SMS spam botnet +
- Andromeda 2.7 features +
- Angler Exploit Kit – Operating at the Cutting Edge +
- Another family of DDoS bots: Avzhan +
- Apache binary backdoors on Cpanel-based servers +
- Apple took 3 years to fix Finfisher trojan hole +
- Avalanche phishers migrate to ZeuS +
- Avatar rootkit: the continuing saga +
- Backdoor uses Evernote as command and control server +
- Bitcrypt broken +
- Black Dragon: "... and all will burn beneath the shadow of my wings" +
- Blackhole and Cool Exploit kits nearly extinct +
- Bot herders build newer versions of previous botnet Waledac +
- BoteAR: a “social botnet”- What are we talking about +
- Botnet command server hidden in Tor +
- Buh-bye Beebone! Law enforcement kills polymorphic virus-spreading botnet +
- CTB-Locker is back: the web server edition +
- CVE-2012-5076 - Massively adopted - Blackhole update to 2.0.1 +
- CVE-2013-2465/CVE-2013-2471/CVE-2013-2463 integrating Exploit Kits -- jre7u21 CVE- jre6u45 and earlier +
- CVE-2013-5330 (Flash) in an unknown Exploit Kit fed by high rank websites +
- CVE-2015-0311 (Flash up to 16.0.0.287) integrating Exploit Kits +
- Carbanak: Multi-million dollar cybercrime gang focuses on banks rather than their customers +
- Carberp-based trojan attacking SAP +
- Cerber Dominates Ransomware Landscape After Locky's Demise +
- Cimbot - A technical analysis +
- Collateral damage: Microsoft hits security researchers along with Citadel +
- Confidential documents from Japanese politics stolen by malware +
- Cracking down on botnets +
- Critroni crypto ransomware seen using Tor for command and control +
- Cross-platform Frutas RAT builder and back door +
- CryptXXX: new ransomware from the actors behind Reveton, dropping via Angler +
- CryptoDefense and How Decrypt ransomware information guide and FAQ +
- DarkMegi rootkit - sample (distributed via Blackhole) +
- Department of Labor strategic web compromise +
- Dharma Ransomware Uses AV Tool to Distract from Malicious Activities +
- Discovered: botnet costing display advertisers over six million dollars per month +
- Disttrack malware overwrites files, infects MBR +
- Dridex learns new trick: P2P over HTTP +
- ESET analyzes first Android file-encrypting, TOR-enabled ransomware +
- Equation: the Death Star of malware galaxy +
- F-Secure has discovered MiniDuke malware samples in the wild +
- FBI ransomware now targeting Apple’s Mac OS X users +
- Fast look at Sundown EK +
- File infector Expiro hits US, steals FTP credentials +
- First step in cross-platform Trojan bankers from Brazil done +
- First widespread virus cross-infection +
- From Sakura to Reveton via Smoke Bot - or a botnet distribution of Reveton +
- Gamarue dropping Lethic bot +
- GandCrab ransomware distributed by RIG and GrandSoft exploit kits +
- Gauss: abnormal distribution +
- Getting more "personal" & deeper into Cridex with parfeit credential stealer infection +
- Going solo: self-propagating ZBOT malware spotted +
- Google Groups trojan +
- Got malware? Rent an exploit service +
- HTran and the Advanced Persistent Threat +
- Hackers are increasingly targeting IoT Devices with Mirai DDoS Malware +
- Harnig botnet: a retreating army +
- Harnig is back +
- Have we seen the end of the ZeroAccess botnet? +
- Hello Neutrino ! (just one more Exploit Kit) +
- How Lockergoga took down Hydro — ransomware used in targeted attacks aimed at big business +
- Hébergeurs malhonnêtes : nouvelle fermeture (3FN) +
- Infamous Skynet botnet author allegedly arrested +
- Inside Impact exploit kit +
- Inside Pony 1.7 / Fareit C&C - Botnet Control Panel +
- Insights into Win32/Bradop +
- Internet Census 2012, port scanning /0 using insecure embedded devices +
- Java Runtime Environment 1.7 Zero-Day Exploit Delivers Backdoor +
- Kelihos botnet trying to expand by harnessing Russian national sentiments +
- Kelihos is dead… No wait… Long live Kelihos! Again! +
- Koobface, un écosystème cybercriminel ou le conte des Mille et une nuits ? +
- Kore exploit kit +
- Latest Kelihos botnet shut down live at RSA Conference 2013 +
- Le dropper de CTB-Locker +