Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- Emerging attack vectors - RSA slide deck +
- Etude sur le fonctionnement du Trojan.Matsnu.1 codant les données des utilisateurs +
- Exploring the market for stolen passwords +
- FAQ on Kelihos.B/Hlux.B sinkholing +
- Fake FBI Ransomware analysis +
- Fast look at an infection by a Blackhole Exploit Kit 2.0 +
- Festi botnet analysis & investigation +
- Flame, Duqu and Stuxnet: in-depth code analysis of mssecmgr.ocx +
- Flame: replication via Windows Update MITM proxy +
- Flamer analysis: framework reconstruction +
- Flamer: highly sophisticated and discreet threat targets the Middle East +
- Flamer: urgent suicide +
- Flashfake Mac OS X botnet confirmed +
- Fortiguard: Android/Stiniter.A!tr +
- From Georgia, with love Win32/Georbot +
- From Sakura to Reveton via Smoke Bot - or a botnet distribution of Reveton +
- Full analysis of Flame's Command & Control servers +
- Full analysis of Flame's command & control servers +
- Gangstaservice Winlock Affiliate +
- Gauss: Nation-state cyber-surveillance meets banking Trojan +
- Gauss: abnormal distribution +
- Get gamed and rue the day... +
- Getting more "personal" & deeper into Cridex with parfeit credential stealer infection +
- Gimemo finally targeting USA with Camera Feature too +
- Gimemo wants to play in the big league +
- Guys behind Gauss and Flame are the same +
- Harvesting data on the Xarvester botmaster +
- HerpesNet botnet 1.7 +
- IRC bot for Android +
- Industrial espionage and targeted attacks: understanding the characteristics of an escalating threat +
- Inside Andromeda Bot v2.06 Webpanel / AKA Gamarue - Botnet Control Panel +
- Inside Blackhole Exploits Kit v1.2.4 - Exploit Kit Control Panel +
- Inside Citadel 1.3.4.5 C&C & Builder - Botnet Control Panel +
- Inside Impact exploit kit +
- Inside Pony 1.7 / Fareit C&C - Botnet Control Panel +
- Inside Smoke Bot - Botnet Control Panel +
- Inside Smoke Bot - botnet control panel +
- Inside Ulocker +
- Inside Upas Kit (1.0.1.1) aka Rombrast C&C - Botnet Control Panel +
- Inside an APT campaign with multiple targets in India and Japan +
- Inside the Grum botnet +
- Inside view of Lyposit aka (for its friends) Lucky LOCKER +
- Insights into Win32/Bradop +
- Interconnection of Gauss with Stuxnet, Duqu & Flame +
- Introducing Ponmocup-Finder +
- It’s 2012 and Armageddon has arrived +
- It’s not the end of the world: DarkComet misses by a mile +
- Java Runtime Environment 1.7 Zero-Day Exploit Delivers Backdoor +
- Java Zero-Days and the Blackhole Exploit Kit +
- Joint strike force against Dorifel +
- Karagny.L unpack +
- Kaspersky Lab et Seculert annoncent la récente découverte de « Madi », une nouvelle attaque de cyberespionnage au Moyen‑Orient +
- Kelihos back in town using Fast Flux +
- Kelihos is dead. Long live Kelihos +
- Kelihos/Hlux botnet returns with new techniques +
- Kelihos: not alien resurrection, more attack of the clones +
- King of spam:Festi botnet analysis +
- Koobface botnet master KrotReal back in business, distributes ransomware and promotes BHSEO service/product +
- Large-scale analysis of malware downloaders +
- Latest SpyEye botnet active and cheaper +
- Learning stateful models for network honeypots +
- Legal implications of countering botnets +
- Library file in certain Android apps connects to C&C servers +
- Long life to Kelihos! +
- MP-DDoser: A rapidly improving DDoS threat +
- MP-DDoser:Monitoring a rapidly improving DDoS threat +
- MSRT April 2012: Win32/Claretore +
- MSRT June '12 - cleanup on aisle one +
- MSRT March 2012: breaking bad +
- MSRT November '12 - Weelsof around the world +
- MSRT September '12 - Medfos, hijacking your daily search +
- MSRT march: three hioles in one +
- Mac BackDoor.Wirenet.1 config extractor +
- Mac Flashback exploiting unpatched Java vulnerability +
- Madi is back - New Tricks and a new Command&Control server +
- Mahdi malware finds 150 new targets including U.S. and Germany, gets more evasive +
- Major shift in strategy for ZeroAccess rootkit malware, as it shifts to user-mode +
- Malicious Apache module injects Iframes +
- Malicious Apache module used for content injection: Linux/Chapro.A +
- Malware 2 - from infection to persistence +
- Malware Memory Analysis - Volatility +
- Malware Uses Google Go Language +
- Malware analysis Rannoh/Matsnu +
- Malware analysis tutorial 32: exploration of botnet client +
- Malware attacking POS systems +
- Malware discovered developed with Google's "Go" programming language +
- Malware hunting with the Sysinternals tools +
- Malware targeting Windows 8 uses Google Docs +
- McAfee Labs threat advisory : W32.Pinkslipbot +
- Measuring botnet populations +
- Meet CritXPack (Previously Vintage Pack) +
- Meet ProPack Exploit Pack - yes that's a lot of pack +
- Meet ‘Flame’, the massive spy malware infiltrating Iranian computers +
- Members of the largest criminal group engaged in online banking fraud are detained +
- Microsoft and financial services industry leaders target cybercriminal operations from ZeuS botnets +
- Microsoft disrupts the emerging Nitol botnet being spread through an unsecure supply chain +
- MoVP 1.3 Desktops, heaps, and ransomware +
- Monkif botnet hides commands in JPEGs +
- More Flame/Skywiper CNC behavior uncovered +
- More details of the Dorifel servers +