Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- MDK: the largest mobile botnet in China +
- Mac spyware found at Oslo Freedom Forum +
- Malware evolving to defeat anti-DDoS services like CloudFlare? +
- Mariposa botnet 'mastermind' jailed in Slovenia +
- Massive search fraud botnet seized by Microsoft and Symantec +
- Mastermind behind Gozi bank malware charged along with two others +
- Measuring and detecting malware downloads in live network traffic +
- Meet "Red Dot exploit toolkit" +
- Microsoft and Symantec take down Bamital botnet that hijacks online searches +
- Miniduke +
- Mysterious Avatar rootkit with API, SDK, and Yahoo Groups for C&C communication +
- NASK shuts down dangerous Virut botnet domains +
- NetTraveler is back: the 'Red Star' APT returns with new tricks +
- New CryptoLocker spreads via removable drives +
- New Mac malware discovered on attendee computer at anti-surveillance workshop +
- New crimeware attacks LatAm bank users +
- Newly launched ‘HTTP-based botnet setup as a service’ empowers novice cybercriminals with bulletproof hosting capabilities +
- Nymaim - obfuscation chronicles +
- OSX Kitmos analysis +
- PeerRush: mining for unwanted P2P traffic +
- PokerAgent botnet stealing over 16,000 Facebook credentials +
- Qadars: un nouveau malware bancaire avec un composant mobile +
- Reversing Andromeda-Gamarue botnet +
- SPL exploit kit – now with CVE-2013-0422 +
- Secrets of the Comfoo masters +
- Stealing money from ATMs with malware +
- Stealthy peer-to-peer C&C over SMB pipes +
- Survey on network-based botnet detection methods +
- Takeover of Virut domains +
- Targeted information stealing attacks in South Asia use email, signed binaries +
- The "Red October" campaign - An advanced cyber espionage network targeting diplomatic and government agencies +
- The MiniDuke mystery: PDF 0-day government spy assembler 0x29A micro backdoor +
- The ZeroAccess botnet revealed +
- The life cycle of web server botnet recruitment +
- The most sophisticated Android trojan +
- The rise of TOR-based botnets +
- Travnet botnet steals huge amount of sensitive data +
- Travnet trojan could be part of APT campaign +
- Trojan ChePro, the CPL storm +
- Trojan Nap aka Kelihos/Hlux - Feb. 2013 status update +
- Trojan horse using sender policy framework +
- Trojan.Ransomgerpo criminal arrested +
- Under the hood of the cyber attack on U.S. banks +
- Unveiling an Indian cyberattack infrastructure - a special report +
- Urausy ransomware - July 2013 design refresh - "Summer 2013 collection" +
- Urausy: Colorfull design refresh (+HR) & EC3 Logo +
- Versatile and infectious: Win64/Expiro is a cross-platform file infector +
- Virut malware fuels Waledac botnet resurgence +
- Waledac gets cozy with Virut +
- Walking through Win32/Jabberbot.A instant messaging C&C +