Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- PETYA crypto-ransomware overwrites MBR to lock users out of their computers +
- Petya ransomware skips the files and encrypts your hard drive instead +
- PlugX malware: A good hacker is an apologetic hacker +
- PlugX: some uncovered points +
- PoisonIvy adapts to communicate through authentication proxies +
- PokerAgent botnet stealing over 16,000 Facebook credentials +
- Qadars: un nouveau malware bancaire avec un composant mobile +
- REVETON Ransomware Spreads with Old Tactics, New Infection Method +
- RIG exploit kit strikes oil +
- Ramnit goes social +
- Ransomware or Wiper? LockerGoga Straddles the Line +
- Ransomware report: the rise of BandarChor +
- Reversing Andromeda-Gamarue botnet +
- Russian service online to check the detection of malware +
- SIRv12: the obstinacy of Conficker +
- SamSam Ransomware Evolves Its Tactics Towards Targeting Whole Companies +
- SamSam ransomware designed to inundate targeted networks with thousands of copies of itself +
- Secrets of the Comfoo masters +
- Security alert: new TGLoader Android malware utilizes the exploid root exploit +
- Skunkx DDoS bot analysis +
- Skynet, a Tor-powered botnet straight from Reddit +
- Smartcard vulnerabilities in modern banking malware +
- Social networks – A bonanza for cybercriminals +
- Sony/Destover: mystery North Korean actor’s destructive and past network activity +
- Sopelka Botnet: three banking trojans and one banking panel +
- Source Code for IoT Botnet ‘Mirai’ Released +
- Spambot evolution 2011 +
- Stamp EK (aka SofosFO) now showing "Blackhole 2.0 Like" landing pages +
- Stealthy peer-to-peer C&C over SMB pipes +
- TR-24 analysis - Destory RAT family +
- Targeted attacks and Ukraine +
- Targeted destructive malware explained: Troj/Mdrop-ELD +
- Targeted information stealing attacks in South Asia use email, signed binaries +
- Tatanga: a new banking trojan with MitB functions +
- Tequila botnet leads to phishing attack +
- The "Red October" campaign - An advanced cyber espionage network targeting diplomatic and government agencies +
- The 'Penquin' Turla +
- The ACCDFISA malware family – Ransomware targeting Windows servers +
- The Andromeda/Gamarue botnet is on the rise again +
- The DGA of Symmi +
- The Epic Turla operation +
- The MiniDuke mystery: PDF 0-day government spy assembler 0x29A micro backdoor +
- The Mirage campaign +
- The Target breach by the numbers +
- The ZeroAccess botnet revealed +
- The good , the bad and the unknown online scanners +
- The graphic design of "Maktub Locker" ransomware +
- The life cycle of web server botnet recruitment +
- The most sophisticated Android trojan +
- The mystery of Duqu: part ten +