Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- APT29 + (08:27:18, 9 August 2015)
- Hammertoss + (08:34:52, 9 August 2015)
- Handle generation algorithm + (08:36:47, 9 August 2015)
- Github + (08:36:55, 9 August 2015)
- Fast flux + (08:38:40, 9 August 2015)
- Domain generation algorithm + (08:38:41, 9 August 2015)
- Double fastflux + (08:39:28, 9 August 2015)
- Category:DNS and URL features + (08:40:06, 9 August 2015)
- Dynamic DNS + (08:40:33, 9 August 2015)
- Hammertoss: stealthy tactics define a Russian cyber threat group + (10:01:08, 9 August 2015)
- BandarChor + (20:28:19, 10 August 2015)
- Ransomware report: the rise of BandarChor + (20:34:37, 10 August 2015)
- CozyDuke + (20:45:10, 10 August 2015)
- Janicab + (20:49:30, 10 August 2015)
- Youtube + (03:34:52, 11 August 2015)
- Protocols + (03:36:00, 11 August 2015)
- UDP/53 + (03:36:42, 11 August 2015)
- DNS + (03:37:44, 11 August 2015)
- MySQL HTTP Tunnel + (03:38:29, 11 August 2015)
- TCP/53 + (03:42:00, 11 August 2015)
- UDP/8998 + (03:42:44, 11 August 2015)
- TCP + (03:44:26, 11 August 2015)
- Joe Stewart + (03:46:07, 11 August 2015)
- Dapato + (03:04:20, 12 August 2015)
- TCP/3360 + (03:23:15, 12 August 2015)
- FTP + (03:23:51, 12 August 2015)
- Domain generation algorithms (DGA) in stealthy malware + (03:24:51, 12 August 2015)
- P2P botnet Kelihos.B with 100.000 nodes sinkholed + (03:26:40, 12 August 2015)
- ZeuS-P2P monitoring and analysis + (03:27:01, 12 August 2015)
- ZeuSbot/Spyeye P2P updated, fortifying the botnet + (03:27:51, 12 August 2015)
- Cracking into the new P2P variant of Zeusbot/Spyeye + (03:28:49, 12 August 2015)
- Dridex learns new trick: P2P over HTTP + (03:29:04, 12 August 2015)
- Dyre + (03:29:54, 12 August 2015)
- All-in-one malware: an overview of Sality + (03:29:55, 12 August 2015)
- SMTP + (03:31:06, 12 August 2015)
- Monkif + (03:32:21, 12 August 2015)
- JPEG encoding + (03:32:42, 12 August 2015)
- TCP/443 + (03:33:17, 12 August 2015)
- SOAP + (03:33:40, 12 August 2015)
- SMS + (03:35:01, 12 August 2015)
- Custom P2P + (03:35:25, 12 August 2015)
- Scareware locks down computer due to child porn and terrorism + (03:36:52, 12 August 2015)
- The evolution of TDL: conquering x64 + (03:39:05, 12 August 2015)
- The mystery of Duqu: part ten + (03:40:23, 12 August 2015)
- Poison Ivy: assessing damage and extracting intelligence + (15:26:34, 12 August 2015)
- The DGA of Symmi + (15:45:34, 12 August 2015)
- Beebone + (15:50:45, 12 August 2015)
- Department of Labor strategic web compromise + (15:41:24, 13 August 2015)
- Armadillo + (15:55:17, 13 August 2015)
- Ranbyus + (04:24:58, 14 August 2015)
- Bobax + (04:39:59, 14 August 2015)
- Cimbot + (04:40:17, 14 August 2015)
- Zapchast + (04:40:34, 14 August 2015)
- Xarvester + (04:41:08, 14 August 2015)
- Produce spam from templates + (04:42:13, 14 August 2015)
- OneWordSub + (04:42:28, 14 August 2015)
- SpamThru + (04:43:57, 14 August 2015)
- Grum + (04:44:20, 14 August 2015)
- Srizbi + (04:45:04, 14 August 2015)
- Mega-D + (04:46:39, 14 August 2015)
- Rustock + (04:46:51, 14 August 2015)
- Cutwail + (04:47:23, 14 August 2015)
- Storm + (04:48:11, 14 August 2015)
- Finfisher + (04:25:50, 15 August 2015)
- Skype surveillance + (04:26:21, 15 August 2015)
- Voice-over-IP surveillance + (04:27:00, 15 August 2015)
- Arcom + (04:28:12, 15 August 2015)
- Lock system + (04:52:22, 15 August 2015)
- Microphone capture + (04:52:45, 15 August 2015)
- Camera capture + (04:53:48, 15 August 2015)
- Accdfisa + (04:54:55, 15 August 2015)
- VirLock + (04:54:56, 15 August 2015)
- Weelsof + (04:54:58, 15 August 2015)
- CTB-Locker + (04:57:18, 15 August 2015)
- Diffie-Hellman + (04:58:11, 15 August 2015)
- Video screen capture + (02:23:30, 17 August 2015)
- Firefox cookie theft + (02:23:49, 17 August 2015)
- Citadel + (02:38:02, 17 August 2015)
- Dynamic webinject configuration update + (02:38:48, 17 August 2015)
- Koobface + (22:55:27, 18 August 2015)
- Koobface, un écosystème cybercriminel ou le conte des Mille et une nuits ? + (22:56:29, 18 August 2015)
- Case study of the Miner botnet + (23:12:32, 18 August 2015)
- Dragonfly + (01:33:53, 19 August 2015)
- Campaigns + (01:37:15, 19 August 2015)
- Seaduke + (01:37:43, 19 August 2015)
- Inside an APT campaign with multiple targets in India and Japan + (01:44:46, 19 August 2015)
- Aerospace + (01:46:27, 19 August 2015)
- Engineering + (01:46:52, 19 August 2015)
- Shipping + (01:47:19, 19 August 2015)
- Military research + (01:48:44, 19 August 2015)
- Tibetan activists + (01:52:48, 19 August 2015)
- ShadowNet + (02:05:36, 19 August 2015)
- Duojeen + (02:07:52, 19 August 2015)
- Sparksrv + (02:08:20, 19 August 2015)
- CVE-2010-3333 + (02:09:57, 19 August 2015)
- XFocus + (02:13:25, 19 August 2015)
- Property:Service category + (02:16:52, 19 August 2015)
- Luckycat + (02:32:52, 19 August 2015)
- Wimmie + (02:34:01, 19 August 2015)
- /closest/ + (02:37:41, 19 August 2015)
- APT1 + (02:38:17, 19 August 2015)
- APT12 + (02:39:17, 19 August 2015)
- Right-to-left override + (02:52:54, 19 August 2015)
- The mystery of Duqu: part six (the command and control servers) + (02:57:28, 19 August 2015)
- The mystery of Duqu: part one + (03:04:06, 19 August 2015)
- Alexander Gostev + (03:06:31, 19 August 2015)
- Disttrack malware overwrites files, infects MBR + (03:17:34, 19 August 2015)
- Etumbot + (03:26:55, 19 August 2015)
- String stacking + (03:29:57, 19 August 2015)
- Russia + (04:00:05, 19 August 2015)
- Five charged in largest hacking scheme ever prosecuted in US + (13:18:58, 19 August 2015)
- Andromeda + (14:02:14, 19 August 2015)
- Butterfly + (14:12:30, 19 August 2015)
- Wopla + (00:47:48, 20 August 2015)
- Hesperbot – A new, advanced banking trojan in the wild + (01:45:47, 20 August 2015)
- Hesperbot + (02:01:42, 20 August 2015)
- VNC server + (02:02:05, 20 August 2015)
- Twofish encryption + (02:02:31, 20 August 2015)
- SMS interception + (02:02:50, 20 August 2015)
- MTAN interception + (02:03:15, 20 August 2015)
- Czech Republic + (02:07:01, 20 August 2015)
- Win32/Gataka - or should we say Zutick? + (02:09:46, 20 August 2015)
- Jean-Ian Boutin + (02:10:04, 20 August 2015)
- Portugal + (02:10:22, 20 August 2015)
- United Kingdom + (02:10:44, 20 August 2015)
- Russian + (02:11:03, 20 August 2015)
- Hodprot: hot to bot + (02:16:32, 20 August 2015)
- Ukraine + (02:27:47, 20 August 2015)
- Kazakhstan + (02:27:50, 20 August 2015)
- Belarus + (02:27:56, 20 August 2015)
- Azerbaijan + (02:28:01, 20 August 2015)
- Republic of Moldova + (02:28:06, 20 August 2015)
- Georgia + (02:28:12, 20 August 2015)
- Latvia + (02:28:17, 20 August 2015)
- Israel + (02:28:19, 20 August 2015)
- Eugene Rodionov + (02:28:26, 20 August 2015)
- Dmitry Volkov + (02:28:27, 20 August 2015)
- TDL-4 + (02:32:49, 20 August 2015)
- Register as print processor + (02:33:46, 20 August 2015)
- Hodprot + (02:37:26, 20 August 2015)
- Custom encryption algorithm + (02:38:35, 20 August 2015)
- Sheldor + (02:40:58, 20 August 2015)
- RDPdoor + (02:41:45, 20 August 2015)
- SAP software + (02:56:22, 20 August 2015)
- Geoff McDonald + (02:59:49, 20 August 2015)
- Carberp-based trojan attacking SAP + (03:00:23, 20 August 2015)
- Gamker + (03:03:18, 20 August 2015)
- Luuuk + (03:14:09, 20 August 2015)
- Karn!v0r3x + (03:30:18, 20 August 2015)
- ZeuS (family) + (14:18:25, 20 August 2015)
- Skynet + (14:19:32, 20 August 2015)
- JabberZeuS + (14:31:36, 20 August 2015)
- BankPatch + (14:44:33, 20 August 2015)
- Soraya + (14:58:07, 20 August 2015)
- Backoff + (14:58:47, 20 August 2015)
- BlackPOS2 + (14:59:55, 20 August 2015)
- BrutPOS + (15:01:11, 20 August 2015)
- JackPOS + (15:02:35, 20 August 2015)
- Pobelka + (15:09:21, 20 August 2015)
- Prinimalka + (15:45:16, 20 August 2015)
- Neverquest + (15:53:19, 20 August 2015)
- Gozi (family) + (16:00:00, 20 August 2015)
- Carbanak/Anunak in the BlueCoat malware analysis appliance + (18:14:08, 20 August 2015)
- Anunak:APT against financial institutions + (18:23:38, 20 August 2015)
- Group-IB + (18:23:56, 20 August 2015)
- Uniemv + (18:29:43, 20 August 2015)
- MBR Eraser + (18:30:08, 20 August 2015)
- Anunak (botnet) + (18:36:02, 20 August 2015)
- Anunak + (18:43:07, 20 August 2015)
- Chthonic + (18:46:08, 20 August 2015)
- Ramnit goes social + (18:50:54, 20 August 2015)
- Ramnit + (18:54:28, 20 August 2015)
- Smartcard vulnerabilities in modern banking malware + (18:55:58, 20 August 2015)
- Shylock financial malware back 'with a vengeance' + (19:07:37, 20 August 2015)
- Shylock + (19:12:21, 20 August 2015)
- Tilon + (19:17:33, 20 August 2015)
- Tilon/SpyEye2 intelligence report + (19:20:53, 20 August 2015)
- Feodo - a new botnet on the rise + (19:56:31, 20 August 2015)
- Demystifying Pobelka + (20:29:37, 20 August 2015)
- Silon + (20:38:05, 20 August 2015)
- 2009-09 + (20:38:22, 20 August 2015)
- SpyEye + (20:48:14, 20 August 2015)
- 2009-12 + (20:50:37, 20 August 2015)
- Bancos + (21:00:36, 20 August 2015)
- Tatanarg + (21:05:42, 20 August 2015)
- 2010-09 + (21:06:06, 20 August 2015)
- Category:Months + (21:20:38, 20 August 2015)
- Tinba + (21:32:27, 20 August 2015)
- Your botnet is my botnet: analysis of a botnet takeover + (21:34:43, 20 August 2015)
- Torpig - Back to the future or how the most sophisticated trojan in 2008 reinvents itself + (21:37:50, 20 August 2015)
- Torpig + (21:45:42, 20 August 2015)
- 2006-01 + (21:46:24, 20 August 2015)
- One Sinowal trojan + one gang = hundreds of thousands of compromised accountS + (21:49:05, 20 August 2015)
- Upas + (21:51:22, 20 August 2015)
- 2012-06 + (21:52:33, 20 August 2015)
- VOlk-botnet takes over Latin America + (21:54:32, 20 August 2015)
- Eduard Kovacs + (21:56:40, 20 August 2015)
- Tatanga: a new banking trojan with MitB functions + (22:06:47, 20 August 2015)
- Tatanga + (22:07:33, 20 August 2015)
- Kneber + (14:41:20, 21 August 2015)
- Massive Drop in number of active Zeus C&C servers + (22:50:51, 21 August 2015)
- Citadel trojan malware analysis + (23:08:05, 21 August 2015)
- The evolution of webinjects + (01:16:42, 22 August 2015)
- The Target breach by the numbers + (02:04:20, 22 August 2015)
- RawPOS + (02:09:58, 22 August 2015)
- BlackPOS + (02:18:15, 22 August 2015)
- Kaptoxa point-of-sale compromise + (02:23:35, 22 August 2015)
- Numaan Huq + (03:28:15, 22 August 2015)
- FighterPOS: a new one-man PoS malware campaign + (03:32:41, 22 August 2015)
- FighterPOS + (03:35:51, 22 August 2015)
- Visual Basic 6 + (03:37:12, 22 August 2015)
- Botnets + (13:04:38, 22 August 2015)
- Zemra (panel) + (23:12:21, 22 August 2015)
- Post-mortem of a zombie: Conficker cleanup after six years + (11:49:50, 25 August 2015)
- Hadi Asghari + (11:50:29, 25 August 2015)
- Michael Ciere + (11:50:43, 25 August 2015)
- Michel J.G. van Eeten + (11:50:56, 25 August 2015)
- Joe Blackbird + (12:57:35, 25 August 2015)
- Microsoft Malware Protection Centre + (12:58:29, 25 August 2015)
- Matt McCormack + (12:58:42, 25 August 2015)
- Office of Naval Research + (12:59:16, 25 August 2015)
- SIRv12: the obstinacy of Conficker + (13:00:07, 25 August 2015)
- Neutrino + (15:24:07, 27 August 2015)
- CVE-2015-2419 + (15:24:54, 27 August 2015)
- Contagio + (15:25:36, 27 August 2015)
- DarkMegi rootkit - sample (distributed via Blackhole) + (15:27:52, 27 August 2015)
- Analysis of DarkMegi aka NpcDark + (15:37:56, 27 August 2015)
- DarkMegi + (15:38:56, 27 August 2015)
- Property:Architecture + (21:59:06, 29 August 2015)
- Benjamin Vanheuverzwijn + (08:49:28, 31 August 2015)
- Sality + (08:54:53, 31 August 2015)
- Hébergeurs malhonnêtes : nouvelle fermeture (3FN) + (19:26:19, 7 September 2015)
- Conficker working group: lessons learned + (20:54:44, 7 September 2015)
- Watch out for CoreBot, new stealer in the wild + (12:54:55, 12 September 2015)
- Limor Kessem + (12:57:14, 12 September 2015)
- Martin Korman + (12:57:32, 12 September 2015)
- An overnight sensation — CoreBot returns as a full-fledged financial malware + (13:00:10, 12 September 2015)
- CoreBot + (13:02:46, 12 September 2015)
- Security Intelligence + (13:03:12, 12 September 2015)
- CoinVault + (08:24:39, 2 October 2015)
- Simda + (10:02:09, 2 October 2015)
- Spartan + (19:12:44, 12 November 2015)
- Pony + (19:13:25, 12 November 2015)
- CVE-2015-7645 + (19:15:14, 12 November 2015)
- Police lock + (10:53:48, 21 November 2015)
- File:Flag of Peru.svg + (11:04:30, 21 November 2015)
- Landings FR + (11:07:18, 21 November 2015)
- GlassRAT + (22:26:56, 24 November 2015)
- ModPOS + (17:59:25, 25 November 2015)
- Cryptowall + (08:41:47, 4 December 2015)
- APT28 + (21:57:43, 15 January 2016)
- CTB-Locker is back: the web server edition + (23:34:28, 1 March 2016)
- Ido Naor + (23:35:02, 1 March 2016)
- Andrey Rassokhin + (20:12:13, 6 March 2016)
- Dmitry Oleksyuk + (20:13:36, 6 March 2016)
- Esage Lab + (20:14:21, 6 March 2016)
- Power Bot + (20:17:22, 6 March 2016)
- TeslaCrypt + (12:28:39, 12 March 2016)
- Locky + (12:29:14, 12 March 2016)
- Nemucod + (12:30:18, 12 March 2016)
- PlugX malware: A good hacker is an apologetic hacker + (13:06:22, 12 March 2016)
- 2016 + (13:06:51, 12 March 2016)
- Dmitry Tarakanov + (13:07:50, 12 March 2016)
- Kaspersky Securelist + (13:08:35, 12 March 2016)
- File:Bouton campaign.png + (13:14:11, 12 March 2016)
- Dmitry Bestuzhev + (13:20:10, 12 March 2016)
- First step in cross-platform Trojan bankers from Brazil done + (13:21:55, 12 March 2016)
- Brazil + (13:22:15, 12 March 2016)
- Attack on Zygote: a new twist in the evolution of mobile threats + (13:28:48, 12 March 2016)
- Triada + (13:29:23, 12 March 2016)
- Nikita Buchka + (13:29:40, 12 March 2016)
- CryptoLocker + (11:10:14, 18 March 2016)
- Microsoft security updates January 2016 + (09:37:48, 19 March 2016)
- CVE-2016-0034 + (09:38:43, 19 March 2016)
- Kurt Baumgartner + (09:39:44, 19 March 2016)
- Social networks – A bonanza for cybercriminals + (09:46:10, 19 March 2016)
- VKontakte + (09:47:44, 19 March 2016)
- Instagram + (09:47:50, 19 March 2016)
- Ruslan Stoyanov + (09:49:40, 19 March 2016)
- ZeuS ransomware feature: win unlock + (09:52:09, 19 March 2016)
- Tis the season for shipping and phishing + (09:54:55, 19 March 2016)
- Andrey Kostin + (09:56:27, 19 March 2016)
- DHL + (09:57:05, 19 March 2016)
- Social networks + (09:57:43, 19 March 2016)
- FedEx + (09:58:31, 19 March 2016)
- You can’t be invulnerable, but you can be well protected + (10:06:58, 19 March 2016)
- CVE-2015-1701 + (10:09:01, 19 March 2016)
- Vyacheslav Zakorzhevsky + (10:09:42, 19 March 2016)
- CVE-2015-3090 + (10:11:30, 19 March 2016)
- CVE-2015-3104 + (10:12:16, 19 March 2016)
- CVE-2015-3105 + (10:13:29, 19 March 2016)
- CVE-2015-5560 + (10:14:46, 19 March 2016)
- CVE-2012-0158 + (10:15:26, 19 March 2016)
- Dyre Banking Trojan + (10:17:33, 19 March 2016)
- Denis Makrushin + (10:20:45, 19 March 2016)
- Maria Garnaeva + (10:20:49, 19 March 2016)
- Anton Ivanov + (10:22:48, 19 March 2016)
- Jornt van der Wiel + (10:25:21, 19 March 2016)
- Yury Namestnikov + (10:25:38, 19 March 2016)
- FakeToken + (10:37:29, 19 March 2016)
- McAfee Labs + (10:37:46, 19 March 2016)
- Carlos Castillo + (10:38:22, 19 March 2016)
- Android malware pairs man-in-the-middle with remote-controlled banking trojan + (10:38:52, 19 March 2016)
- Kaspersky security bulletin 2015. Overall statistics for 2015 + (10:39:32, 19 March 2016)
- Trojan ChePro, the CPL storm + (10:45:43, 19 March 2016)
- ChePro + (10:46:42, 19 March 2016)
- .CPL + (10:47:30, 19 March 2016)
- Fabio Assolini + (10:47:56, 19 March 2016)
- Marcher + (10:53:50, 19 March 2016)
- Android Marcher now marching via porn sites + (10:56:08, 19 March 2016)
- Zscaler + (10:56:25, 19 March 2016)
- Property:Target + (11:03:00, 19 March 2016)
- Category:Vulnerability packages + (11:03:16, 19 March 2016)
- CVE-2015-1539 + (11:10:50, 19 March 2016)
- CVE-2015-1538 + (11:14:45, 19 March 2016)
- CVE-2015-3824 + (11:23:04, 19 March 2016)
- CVE-2015-3827 + (11:27:59, 19 March 2016)
- CVE-2015-3829 + (11:29:31, 19 March 2016)
- CVE-2015-3828 + (11:30:35, 19 March 2016)
- CVE-2015-3826 + (11:32:07, 19 March 2016)
- Property:Cve + (11:34:26, 19 March 2016)
- Stagefright + (11:35:21, 19 March 2016)
- Cryakl + (12:08:21, 19 March 2016)
- Shade + (12:10:33, 19 March 2016)
- Scatter + (12:11:12, 19 March 2016)
- Trojan downloaders on the rise: don’t let Locky or TeslaCrypt ruin your day + (21:39:34, 19 March 2016)
- Josep Albors + (21:40:58, 19 March 2016)
- ESET Welivesecurity + (21:41:43, 19 March 2016)
- Anton Cherepanov + (21:42:20, 19 March 2016)
- Bharat Jogi + (21:16:39, 21 March 2016)
- Microsoft + (21:19:49, 21 March 2016)
- T.J. Campana + (21:21:48, 21 March 2016)
- FireEye + (21:22:16, 21 March 2016)
- Ali Islam + (21:23:12, 21 March 2016)
- Gauss: abnormal distribution + (21:24:23, 21 March 2016)
- GReAT + (21:24:38, 21 March 2016)
- Disttrack sabotage malware wipes data at unnamed Middle East energy organization + (21:27:13, 21 March 2016)
- Wired Business Media + (21:30:23, 21 March 2016)
- Brian Prince + (21:47:22, 21 March 2016)
- Sophos Labs + (21:53:22, 21 March 2016)
- James Wyke + (21:57:59, 21 March 2016)
- André M. DiMino + (22:25:25, 21 March 2016)
- Hendrik Adrian + (22:28:23, 21 March 2016)
- Akbot (bot) + (22:29:26, 21 March 2016)
- University of Pennsylvania + (22:30:06, 21 March 2016)
- McAfee Labs threat advisory : W32.Pinkslipbot + (22:32:28, 21 March 2016)
- Fortinet + (22:35:31, 21 March 2016)
- Kyle Yang + (22:37:56, 21 March 2016)
- François Paget + (22:38:27, 21 March 2016)
- Prosenjit Sinha + (22:38:58, 21 March 2016)
- The graphic design of "Maktub Locker" ransomware + (09:27:05, 23 March 2016)
- Encrypt without C&C connection + (09:29:16, 23 March 2016)
- Maktub Locker + (09:39:16, 23 March 2016)
- Coverton + (14:17:56, 27 March 2016)
- PETYA crypto-ransomware overwrites MBR to lock users out of their computers + (20:57:15, 27 March 2016)
- TrendLabs Security Intelligence Blog + (20:57:42, 27 March 2016)
- Jasen Sumalapao + (20:57:53, 27 March 2016)
- MBR overwrite + (21:08:06, 27 March 2016)
- Encrypt MFT + (21:08:35, 27 March 2016)
- Petya ransomware skips the files and encrypts your hard drive instead + (21:12:03, 27 March 2016)
- Bleeping Computer + (21:12:26, 27 March 2016)
- Lawrence Abrams + (21:12:37, 27 March 2016)
- CryptoDefense and How Decrypt ransomware information guide and FAQ + (21:14:23, 27 March 2016)
- CryptoDefense + (21:15:16, 27 March 2016)
- Petya + (21:19:29, 27 March 2016)
- TreasureHunt: a custom POS malware tool + (15:23:25, 28 March 2016)
- TreasureHunt + (15:27:16, 28 March 2016)
- FrameworkPOS + (12:32:26, 16 April 2016)
- Luis Mendieta + (12:35:56, 16 April 2016)
- Three month FrameworkPOS malware campaign nabs ~43,000 credit cards from point of sale systems + (12:37:17, 16 April 2016)
- Launch delay + (19:34:10, 19 April 2016)
- Monitor mouse events + (19:34:36, 19 April 2016)
- Check CPU name in registry + (19:34:50, 19 April 2016)
- Delphi + (19:35:58, 19 April 2016)
- Bedep + (19:41:42, 19 April 2016)
- Proofpoint + (19:42:33, 19 April 2016)
- Property:Botnetstring + (20:27:09, 19 April 2016)
- CryptXXX + (20:27:47, 19 April 2016)
- CryptXXX: new ransomware from the actors behind Reveton, dropping via Angler + (20:34:35, 19 April 2016)
- CryptProjectXXX + (20:37:23, 19 April 2016)
- Category:Strings + (20:37:57, 19 April 2016)
- Erase files + (07:50:28, 1 May 2016)
- Jigsaw + (08:00:35, 1 May 2016)
- New crypto-ransomware JIGSAW plays nasty games + (08:03:02, 1 May 2016)
- AbaddonPOS + (13:48:07, 14 May 2016)
- AbaddonPOS: A new point of sale threat linked to Vawtrak + (13:52:43, 14 May 2016)
- Darien Huss + (13:53:18, 14 May 2016)
- Coinbitclip + (12:22:36, 28 June 2016)
- Source Code for IoT Botnet ‘Mirai’ Released + (17:45:52, 22 October 2016)
- Bashlight + (17:46:49, 22 October 2016)
- IoT + (17:52:42, 22 October 2016)
- GRE flood + (17:54:43, 22 October 2016)
- Anna-senpai + (18:02:18, 22 October 2016)
- Category:Person + (18:02:55, 22 October 2016)
- Krebs on Security + (18:04:02, 22 October 2016)
- MMD-0056-2016 - Linux/Mirai, how an old ELF malcode is recycled + (18:08:48, 22 October 2016)
- Hackers are increasingly targeting IoT Devices with Mirai DDoS Malware + (09:58:15, 30 October 2016)
- XiongMai Technologies + (09:59:27, 30 October 2016)
- C + (10:00:57, 30 October 2016)
- Go + (10:01:12, 30 October 2016)
- AVTECH + (10:01:54, 30 October 2016)
- Dahua Technology + (10:02:54, 30 October 2016)
- HackRead + (10:03:36, 30 October 2016)
- Waqas Amir + (10:05:13, 30 October 2016)
- Mirai + (10:09:51, 30 October 2016)
- Motorola 68000 + (10:12:14, 30 October 2016)
- Category:CPU + (10:12:34, 30 October 2016)
- Trustwave + (10:14:29, 30 October 2016)
- Landings DE + (10:19:13, 30 October 2016)
- File:Flag of Germany.svg + (10:35:05, 30 October 2016)
- File:Flag of France.svg + (10:41:07, 30 October 2016)
- File:Flag placeholder.svg + (10:49:21, 30 October 2016)
- Updated Sundown Exploit Kit Uses Steganography + (13:27:58, 1 January 2017)
- Zeus variant Floki bot targets PoS data + (21:48:46, 3 January 2017)
- Floki + (21:51:19, 3 January 2017)
- Point-of-sale terminals + (21:52:47, 3 January 2017)
- GootKit + (15:54:59, 26 January 2017)
- Sage + (21:12:15, 3 February 2017)
- ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar + (13:55:00, 18 February 2017)
- ViperRAT + (13:57:13, 18 February 2017)
- Michael Flossman + (13:57:24, 18 February 2017)
- Israeli Defence Force + (13:58:04, 18 February 2017)
- 2017 + (13:59:55, 18 February 2017)
- Cerber Dominates Ransomware Landscape After Locky's Demise + (09:36:22, 16 April 2017)
- Catalin Cimpanu + (09:36:52, 16 April 2017)
- As-a-service + (09:39:00, 16 April 2017)
- Cerber + (09:40:10, 16 April 2017)
- .cerber + (09:40:31, 16 April 2017)
- Category:File extension + (09:41:47, 16 April 2017)
- Japan + (07:10:15, 9 August 2017)
- Shifu + (07:11:30, 9 August 2017)
- Where Are They Today? Cybercrime Trojans That No One Misses: Shifu Malware + (07:14:12, 9 August 2017)
- Lukitus + (16:24:03, 23 August 2017)
- .lukitus + (16:24:27, 23 August 2017)
- Locky Ransomware switches to the Lukitus extension for Encrypted Files + (16:27:38, 23 August 2017)
- CVE-2017-5715 + (22:38:49, 3 January 2018)
- Intel CPUs + (22:39:28, 3 January 2018)
- APT15 + (14:05:19, 10 March 2018)
- TinyNuke + (14:43:02, 17 April 2018)
- TinyNuke may be a ticking time bomb + (18:52:08, 17 April 2018)
- SamSam Ransomware Evolves Its Tactics Towards Targeting Whole Companies + (15:36:11, 1 May 2018)
- SamSam + (15:36:33, 1 May 2018)
- Tara Seals + (15:37:13, 1 May 2018)
- 2018 + (15:39:52, 1 May 2018)
- Threatpost + (15:40:22, 1 May 2018)
- Dennis Fisher + (15:40:33, 1 May 2018)
- SamSam ransomware designed to inundate targeted networks with thousands of copies of itself + (15:44:28, 1 May 2018)
- SC Magazine + (15:44:53, 1 May 2018)
- Bradley Barth + (15:45:03, 1 May 2018)
- TCP/2541 + (15:17:57, 17 July 2018)
- Revenge RAT + (15:23:20, 17 July 2018)
- GandCrab + (12:59:16, 18 July 2018)
- GandCrab ransomware distributed by RIG and GrandSoft exploit kits + (13:03:42, 18 July 2018)
- Malwarebytes + (13:04:07, 18 July 2018)
- Jérôme Segura + (13:04:39, 18 July 2018)
- Vasilios Hioueras + (13:04:56, 18 July 2018)
- Ransomware or Wiper? LockerGoga Straddles the Line + (09:10:09, 23 March 2019)
- Ransomware : la sulfureuse hypothèse sur la situation chez Norsk Hydro + (09:17:09, 23 March 2019)
- Norsk Hydro + (09:17:57, 23 March 2019)
- Nick Biasini + (09:18:10, 23 March 2019)
- 2019 + (09:28:12, 23 March 2019)
- Altran + (09:28:47, 23 March 2019)
- How Lockergoga took down Hydro — ransomware used in targeted attacks aimed at big business + (09:33:45, 23 March 2019)
- LockerGoga + (09:47:48, 23 March 2019)
- Disable network adapters + (09:50:19, 23 March 2019)
- Dharma + (14:10:44, 12 May 2019)
- Dharma Ransomware Uses AV Tool to Distract from Malicious Activities + (14:13:51, 12 May 2019)
- smw/schema:Group:Schema properties + (11:32:19, 20 October 2019)
- Property:Foaf:knows + (11:34:28, 20 October 2019)
- Property:Foaf:name + (11:34:32, 20 October 2019)
- Property:Foaf:homepage + (11:34:33, 20 October 2019)
- Property:Owl:differentFrom + (11:34:34, 20 October 2019)
- .CryptoHasYou. + (20:36:25, 3 March 2020)
- .enc + (20:36:48, 3 March 2020)
- Main Page + (10:17:33, 14 March 2020)
- Property:Type of asset + (10:30:04, 14 March 2020)
- COVID-19 pandemic + (10:35:35, 14 March 2020)
- Live Coronavirus Map Used to Spread Malware + (10:54:24, 14 March 2020)
- Netwalker + (10:45:36, 11 July 2021)
- Ryuk + (11:27:13, 11 July 2021)
- Ragnar Locker + (11:28:25, 11 July 2021)
- REvil + (11:29:07, 11 July 2021)
- Egregor + (11:30:20, 11 July 2021)
- Bitpaymer + (11:30:45, 11 July 2021)
- DarkSide + (11:31:26, 11 July 2021)
- WannaCry + (11:33:11, 11 July 2021)
- Qlocker + (11:33:27, 11 July 2021)
- smw/schema:Group:Predefined properties + (12:33:03, 14 July 2021)
- Bac à sable + (20:40:01, 14 July 2021)
- REvil ransomware gang's web sites mysteriously shut down + (20:52:53, 14 July 2021)
- 2021 + (20:53:19, 14 July 2021)
- LockBit + (05:04:26, 15 July 2021)