Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- "NetTraveler is Running!" - Red Star APT attacks compromise high-profile victims +
- "njRAT" Uncovered +
- APT1: technical backstage +
- Adobe Flash Player 0-day and HackingTeam's Remote Control System +
- Alina: casting a shadow on POS +
- Alina: following the shadow part 1 +
- Alina: following the shadow part 2 +
- An encounter with trojan Nap +
- An overview of messaging botnets +
- Analyse of the sample cdorked.A +
- Analysis of a PlugX malware variant used for targeted attacks +
- Analysis of a stage 3 Miniduke malware sample +
- Analysis of the malware of Red October - Part 1 +
- Analysis of the malware of Red October - Part 2 +
- Apache binary backdoors on Cpanel-based servers +
- Attention! All data on your hardrive is encrypted +
- Avatar rootkit: the continuing saga +
- Backdoor uses Evernote as command and control server +
- Black Dragon: "... and all will burn beneath the shadow of my wings" +
- Blackhole and Cool Exploit kits nearly extinct +
- Bot herders build newer versions of previous botnet Waledac +
- CVE-2013-1493 (jre17u15 - jre16u41) integrating exploit kits +
- CVE-2013-2465/CVE-2013-2471/CVE-2013-2463 integrating Exploit Kits -- jre7u21 CVE- jre6u45 and earlier +
- Carberp-based trojan attacking SAP +
- Chameleon botnet grabbed $6m A MONTH from online ad-slingers +
- Citadel plitfi botnet report +
- Collateral damage: Microsoft hits security researchers along with Citadel +
- Cross-platform Frutas RAT builder and back door +
- Demystifying Pobelka +
- Department of Labor strategic web compromise +
- Detecting extended attributes (ZeroAccess) and other Frankenstein’s monsters with HMFT +
- Discovered: botnet costing display advertisers over six million dollars per month +
- File infector Expiro hits US, steals FTP credentials +
- First widespread virus cross-infection +
- Five charged in largest hacking scheme ever prosecuted in US +
- Going solo: self-propagating ZBOT malware spotted +
- Got malware? Rent an exploit service +
- Hello Neutrino ! (just one more Exploit Kit) +
- Hesperbot – A new, advanced banking trojan in the wild +
- Hiding in plain sight: the FAKEM remote access trojan +
- Infamous Skynet botnet author allegedly arrested +
- Inside the world of the Citadel trojan +
- Internet Census 2012, port scanning /0 using insecure embedded devices +
- Kelihos botnet appears again with new variant +
- Kelihos is dead… No wait… Long live Kelihos! Again! +
- Kore exploit kit +
- Latest Kelihos botnet shut down live at RSA Conference 2013 +
- Lifting the lid on the Redkit exploit kit (Part 1) +
- Linux/Cdorked.A: New Apache backdoor being used in the wild to serve Blackhole +
- Look what I found: it's a Pony! +
- MDK: the largest mobile botnet in China +
- Mac spyware found at Oslo Freedom Forum +
- Malware evolving to defeat anti-DDoS services like CloudFlare? +
- Mariposa botnet 'mastermind' jailed in Slovenia +
- Massive search fraud botnet seized by Microsoft and Symantec +
- Mastermind behind Gozi bank malware charged along with two others +
- Measuring and detecting malware downloads in live network traffic +
- Meet "Red Dot exploit toolkit" +
- Microsoft and Symantec take down Bamital botnet that hijacks online searches +
- Miniduke +
- Mysterious Avatar rootkit with API, SDK, and Yahoo Groups for C&C communication +
- NASK shuts down dangerous Virut botnet domains +
- NetTraveler is back: the 'Red Star' APT returns with new tricks +
- New CryptoLocker spreads via removable drives +
- New Mac malware discovered on attendee computer at anti-surveillance workshop +
- New crimeware attacks LatAm bank users +
- Newly launched ‘HTTP-based botnet setup as a service’ empowers novice cybercriminals with bulletproof hosting capabilities +
- Nymaim - obfuscation chronicles +
- OSX Kitmos analysis +
- PeerRush: mining for unwanted P2P traffic +
- PokerAgent botnet stealing over 16,000 Facebook credentials +
- Qadars: un nouveau malware bancaire avec un composant mobile +
- Reversing Andromeda-Gamarue botnet +
- SPL exploit kit – now with CVE-2013-0422 +
- Secrets of the Comfoo masters +
- Stealing money from ATMs with malware +
- Stealthy peer-to-peer C&C over SMB pipes +
- Survey on network-based botnet detection methods +
- Takeover of Virut domains +
- Targeted information stealing attacks in South Asia use email, signed binaries +
- The "Red October" campaign - An advanced cyber espionage network targeting diplomatic and government agencies +
- The MiniDuke mystery: PDF 0-day government spy assembler 0x29A micro backdoor +
- The ZeroAccess botnet revealed +
- The life cycle of web server botnet recruitment +
- The most sophisticated Android trojan +
- The rise of TOR-based botnets +
- Travnet botnet steals huge amount of sensitive data +
- Travnet trojan could be part of APT campaign +
- Trojan ChePro, the CPL storm +
- Trojan Nap aka Kelihos/Hlux - Feb. 2013 status update +
- Trojan horse using sender policy framework +
- Trojan.Ransomgerpo criminal arrested +
- Under the hood of the cyber attack on U.S. banks +
- Unveiling an Indian cyberattack infrastructure - a special report +
- Urausy ransomware - July 2013 design refresh - "Summer 2013 collection" +
- Urausy: Colorfull design refresh (+HR) & EC3 Logo +
- Versatile and infectious: Win64/Expiro is a cross-platform file infector +
- Virut malware fuels Waledac botnet resurgence +
- Waledac gets cozy with Virut +
- Walking through Win32/Jabberbot.A instant messaging C&C +