Short pages
Jump to navigation
Jump to search
Showing below up to 500 results in range #1,001 to #1,500.
View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)
- (hist) Monkif [171 bytes]
- (hist) VOlk [171 bytes]
- (hist) Neutrino [171 bytes]
- (hist) Incognito [171 bytes]
- (hist) Skynet [173 bytes]
- (hist) Avatar [175 bytes]
- (hist) CryptoLocker [175 bytes]
- (hist) NitlovePOS [175 bytes]
- (hist) Njw0rm [177 bytes]
- (hist) CritXPack [177 bytes]
- (hist) ZeroLocker [178 bytes]
- (hist) Bradop [178 bytes]
- (hist) Lock system [179 bytes]
- (hist) Butterfly [182 bytes]
- (hist) Simda [183 bytes]
- (hist) Niteris [186 bytes]
- (hist) Taidoor [189 bytes]
- (hist) Techno XPack [189 bytes]
- (hist) Whitewell [189 bytes]
- (hist) Swizzor [190 bytes]
- (hist) Wiper [190 bytes]
- (hist) Gangstaservice Winlock Affiliate [190 bytes]
- (hist) CVE-2014-0768 [195 bytes]
- (hist) Department of Labor strategic web compromise [195 bytes]
- (hist) CVE-2012-5076 - Massively adopted - Blackhole update to 2.0.1 [197 bytes]
- (hist) Nucrypt [197 bytes]
- (hist) Silon [197 bytes]
- (hist) Disker [199 bytes]
- (hist) Bredolab [201 bytes]
- (hist) ISR Stealer [201 bytes]
- (hist) Sweet Orange [201 bytes]
- (hist) Analyse of the sample cdorked.A [203 bytes]
- (hist) Adrenalin [204 bytes]
- (hist) Lethic [204 bytes]
- (hist) ZeuS-P2P monitoring and analysis [204 bytes]
- (hist) Archie [205 bytes]
- (hist) RedKit [207 bytes]
- (hist) Handle generation algorithm [207 bytes]
- (hist) Makadocs [208 bytes]
- (hist) Bafruz [208 bytes]
- (hist) Dlena [211 bytes]
- (hist) PokerAgent [211 bytes]
- (hist) Pushdo [211 bytes]
- (hist) Cracking the encrypted C&C protocol of the ZeroAccess botnet [211 bytes]
- (hist) GamaPoS [213 bytes]
- (hist) BankPatch [215 bytes]
- (hist) DarkMegi [215 bytes]
- (hist) Eleonore [216 bytes]
- (hist) Alpha Pack [216 bytes]
- (hist) NewPOSThings [219 bytes]
- (hist) Conficker [220 bytes]
- (hist) Fuflo [221 bytes]
- (hist) HelloGirl [221 bytes]
- (hist) OneWordSub [221 bytes]
- (hist) Ranky [221 bytes]
- (hist) LogPOS [221 bytes]
- (hist) Kaptoxa point-of-sale compromise [221 bytes]
- (hist) Hammertoss: stealthy tactics define a Russian cyber threat group [222 bytes]
- (hist) Uniemv [222 bytes]
- (hist) Feederbot [223 bytes]
- (hist) Analysis of Ysreef (a variant of Tobfy) [224 bytes]
- (hist) Fast flux [224 bytes]
- (hist) CVE-2011-0558 [224 bytes]
- (hist) CoreBot [224 bytes]
- (hist) Jenxcus [225 bytes]
- (hist) Spachanel [225 bytes]
- (hist) Siberia [225 bytes]
- (hist) Bahama [227 bytes]
- (hist) Automated transfer system (ATS) [227 bytes]
- (hist) Skunkx [227 bytes]
- (hist) PiceBOT [228 bytes]
- (hist) Hlux (bot) [230 bytes]
- (hist) Arcom [231 bytes]
- (hist) Magnitude [231 bytes]
- (hist) Mega-D [232 bytes]
- (hist) Fakavalert [234 bytes]
- (hist) Hébergeurs malhonnêtes : nouvelle fermeture (3FN) [235 bytes]
- (hist) Stamp EK (aka SofosFO) now showing "Blackhole 2.0 Like" landing pages [236 bytes]
- (hist) Hikit [237 bytes]
- (hist) Mac BackDoor.Wirenet.1 config extractor [237 bytes]
- (hist) Waledac [238 bytes]
- (hist) Rocra [239 bytes]
- (hist) Getting more "personal" & deeper into Cridex with parfeit credential stealer infection [241 bytes]
- (hist) BlackShades [242 bytes]
- (hist) DarkComet [242 bytes]
- (hist) Rustock [244 bytes]
- (hist) Es:Plantilla:Div col [247 bytes]
- (hist) CVE-2010-3552 [247 bytes]
- (hist) Mytob [248 bytes]
- (hist) Snap [248 bytes]
- (hist) Analyse statique de Duqu stage 1 [249 bytes]
- (hist) Sinowal [250 bytes]
- (hist) Sinit [251 bytes]
- (hist) Pandora [252 bytes]
- (hist) Festi botnet analysis & investigation [252 bytes]
- (hist) Meet "Red Dot exploit toolkit" [257 bytes]
- (hist) Gamker [258 bytes]
- (hist) Nugache [259 bytes]
- (hist) Psybot [259 bytes]
- (hist) Zapchast [259 bytes]
- (hist) Mariachi [260 bytes]
- (hist) Murofet [260 bytes]
- (hist) VinSelf [260 bytes]
- (hist) Aldi Bot - bka.de DDoS [260 bytes]
- (hist) RIG [261 bytes]
- (hist) Gong Da [261 bytes]
- (hist) CVE-2010-0188 [262 bytes]
- (hist) Asprox [263 bytes]
- (hist) Slapper [263 bytes]
- (hist) Urausy: Colorfull design refresh (+HR) & EC3 Logo [264 bytes]
- (hist) ZeroAccess [265 bytes]
- (hist) DaRK DDoSseR [267 bytes]
- (hist) Silent Winlocker [268 bytes]
- (hist) RBot [268 bytes]
- (hist) EURO Winlocker [269 bytes]
- (hist) Virut [270 bytes]
- (hist) Cimbot [272 bytes]
- (hist) Gauss [277 bytes]
- (hist) CVE-2010-0886 [277 bytes]
- (hist) CVE-2011-3106 [278 bytes]
- (hist) CVE-2015-2419 [280 bytes]
- (hist) Poseidon [281 bytes]
- (hist) Dirt Jumper [282 bytes]
- (hist) Upas [282 bytes]
- (hist) CVE-2012-1880 [282 bytes]
- (hist) Agobot [286 bytes]
- (hist) Gapz [286 bytes]
- (hist) CVE-2015-7645 [288 bytes]
- (hist) Leouncia [290 bytes]
- (hist) Barracuda [291 bytes]
- (hist) Phone home [291 bytes]
- (hist) CVE-2007-5659 [292 bytes]
- (hist) Новый сэмпл Pandora DDoS Bot [294 bytes]
- (hist) CVE-2012-4969 [294 bytes]
- (hist) Dragonfly [295 bytes]
- (hist) Tilon [296 bytes]
- (hist) Nuevo botnet contra Mexico: Karn!v0r3x [296 bytes]
- (hist) Pramro [301 bytes]
- (hist) SpamThru [301 bytes]
- (hist) CVE-2015-1539 [301 bytes]
- (hist) Gumblar [302 bytes]
- (hist) Phatbot [304 bytes]
- (hist) CVE-2013-0640 [304 bytes]
- (hist) CVE-2008-2992 [307 bytes]
- (hist) Stagefright [307 bytes]
- (hist) CVE-2012-3683 [308 bytes]
- (hist) Finfisher [308 bytes]
- (hist) Inside Smoke Bot - botnet control panel [311 bytes]
- (hist) CVE-2015-1701 [311 bytes]
- (hist) CVE-2011-2371 [312 bytes]
- (hist) Fast look at Sundown EK [312 bytes]
- (hist) Mirai [313 bytes]
- (hist) Dyre [315 bytes]
- (hist) Tatanarg [316 bytes]
- (hist) Winlock affiliate [318 bytes]
- (hist) Grum [319 bytes]
- (hist) HerpesNet [323 bytes]
- (hist) Polybot [325 bytes]
- (hist) CVE-2011-2110 [325 bytes]
- (hist) The graphic design of "Maktub Locker" ransomware [325 bytes]
- (hist) Wopla [327 bytes]
- (hist) CVE-2015-5560 [333 bytes]
- (hist) CVE-2013-0074 [334 bytes]
- (hist) Chameleon [335 bytes]
- (hist) CVE-2005-0055 [336 bytes]
- (hist) Ransom.HY [338 bytes]
- (hist) CVE-2016-0034 [339 bytes]
- (hist) CVE-2010-4452 [342 bytes]
- (hist) Inside Smoke Bot - Botnet Control Panel [346 bytes]
- (hist) Hodprot [347 bytes]
- (hist) Gameover [348 bytes]
- (hist) Luckycat [348 bytes]
- (hist) Inside Pony 1.7 / Fareit C&C - Botnet Control Panel [350 bytes]
- (hist) Update to Citadel : 1.3.5.1 Rain Edition. [353 bytes]
- (hist) Medfos [354 bytes]
- (hist) Upas Kit (aka Rombrast) integrates webinjects [355 bytes]
- (hist) Update to Citadel : v.1.3.4.5 [356 bytes]
- (hist) Encyclopedia entry: Win32/Carberp [357 bytes]
- (hist) Meet ProPack Exploit Pack - yes that's a lot of pack [358 bytes]
- (hist) CVE-2015-1538 [358 bytes]
- (hist) MP-DDoser:Monitoring a rapidly improving DDoS threat [361 bytes]
- (hist) Gimemo wants to play in the big league [362 bytes]
- (hist) CVE-2012-4681 - On its way to Sakura Exploit Kit too [362 bytes]
- (hist) Inside Blackhole Exploits Kit v1.2.4 - Exploit Kit Control Panel [363 bytes]
- (hist) CVE-2010-3333 [363 bytes]
- (hist) Inside view of Lyposit aka (for its friends) Lucky LOCKER [364 bytes]
- (hist) CVE-2009-4324 [364 bytes]
- (hist) CVE-2009-3867 [366 bytes]
- (hist) CVE-2010-0248 [366 bytes]
- (hist) Pobelka [367 bytes]
- (hist) Phoenix [367 bytes]
- (hist) Inside Citadel 1.3.4.5 C&C & Builder - Botnet Control Panel [368 bytes]
- (hist) CVE-2012-0003 [368 bytes]
- (hist) CVE-2009-0075 [369 bytes]
- (hist) Ransom.II - UGC payment for USA - Windows Genuine impersonation for DE [370 bytes]
- (hist) Inside Andromeda Bot v2.06 Webpanel / AKA Gamarue - Botnet Control Panel [372 bytes]
- (hist) Analyse statique de Duqu stage 2 [373 bytes]
- (hist) CVE-2012-4681 - Связка Sweet Orange [373 bytes]
- (hist) Warezov [374 bytes]
- (hist) Weelsof use SSL C&C [374 bytes]
- (hist) CVE-2011-2462 [374 bytes]
- (hist) CVE-2011-3521 [374 bytes]
- (hist) CVE-2009-0076 [375 bytes]
- (hist) CVE-2015-3824 [376 bytes]
- (hist) Hello Neutrino ! (just one more Exploit Kit) [377 bytes]
- (hist) CVE-2012-0779 [377 bytes]
- (hist) CVE-2015-3829 [377 bytes]
- (hist) Xarvester [378 bytes]
- (hist) CVE-2012-4792 [378 bytes]
- (hist) Backconnect server [379 bytes]
- (hist) AutoIT ransomware [379 bytes]
- (hist) Symantec/Android.Ackposts [380 bytes]
- (hist) Ransomware « Trojan.Casier » Panel [381 bytes]
- (hist) FighterPOS [381 bytes]
- (hist) CVE-2012-0500 [382 bytes]
- (hist) Bobax [384 bytes]
- (hist) CVE-2011-3659 [384 bytes]
- (hist) CVE-2009-2477 [384 bytes]
- (hist) Obad [385 bytes]
- (hist) Ramnit [387 bytes]
- (hist) Cool EK : "Hello my friend..." CVE-2012-5076 [388 bytes]
- (hist) Nuclear Pack [395 bytes]
- (hist) TreasureHunt [399 bytes]
- (hist) Analyse de Xtreme RAT [400 bytes]
- (hist) PTA [401 bytes]
- (hist) Using libemu to create malware flow graph [401 bytes]
- (hist) IKee.B (botnet) [402 bytes]
- (hist) Petya [403 bytes]
- (hist) Mlano [405 bytes]
- (hist) CVE-2015-3827 [405 bytes]
- (hist) Prinimalka [407 bytes]
- (hist) CVE-2011-1255 [408 bytes]
- (hist) Bozok [417 bytes]
- (hist) CVE-2008-5353 [419 bytes]
- (hist) Mocbot [420 bytes]
- (hist) Nitol [421 bytes]
- (hist) FBI ransomware now targeting Apple’s Mac OS X users [423 bytes]
- (hist) Ipeur [424 bytes]
- (hist) Khan [425 bytes]
- (hist) Ponmocup [426 bytes]
- (hist) SMSZombie [428 bytes]
- (hist) Goscri [429 bytes]
- (hist) Bamital [430 bytes]
- (hist) Poison Ivy 2.3.0 Documentation [430 bytes]
- (hist) Urausy ransomware - July 2013 design refresh - "Summer 2013 collection" [432 bytes]
- (hist) Chidol [434 bytes]
- (hist) Flagui [434 bytes]
- (hist) Analyse et poncage du botnet HerpesNet [437 bytes]
- (hist) CVE-2013-2551 [438 bytes]
- (hist) CVE-2011-2140 [439 bytes]
- (hist) CVE-2012-1876 [440 bytes]
- (hist) Security Response Android.Counterclank [441 bytes]
- (hist) Cool exploit kit - URL structure [447 bytes]
- (hist) Angler [450 bytes]
- (hist) Harasom [455 bytes]
- (hist) Hamweq [457 bytes]
- (hist) Tatanga [458 bytes]
- (hist) Meet CritXPack (Previously Vintage Pack) [458 bytes]
- (hist) CVE-2015-3828 [458 bytes]
- (hist) CVE-2011-0559 [459 bytes]
- (hist) CVE-2013-3897 [460 bytes]
- (hist) Mahdi malware finds 150 new targets including U.S. and Germany, gets more evasive [462 bytes]
- (hist) CVE-2010-2884 [462 bytes]
- (hist) A peek inside the PickPocket botnet [465 bytes]
- (hist) OSX.Iservice technical details [467 bytes]
- (hist) CVE-2010-1240 [473 bytes]
- (hist) Wirenet [475 bytes]
- (hist) CVE-2010-3654 [475 bytes]
- (hist) MP-DDoser [477 bytes]
- (hist) Foag [478 bytes]
- (hist) Gimemo finally targeting USA with Camera Feature too [478 bytes]
- (hist) Inside Ulocker [480 bytes]
- (hist) CVE-2015-3090 [481 bytes]
- (hist) Infinity [482 bytes]
- (hist) Cross-platform Frutas RAT builder and back door [482 bytes]
- (hist) Tales from Crisis, Chapter 1: The dropper’s box of tricks [483 bytes]
- (hist) VOlk-botnet takes over Latin America [484 bytes]
- (hist) Malex [487 bytes]
- (hist) Gema [488 bytes]
- (hist) Component Object Model (COM) [488 bytes]
- (hist) Necurs [488 bytes]
- (hist) CVE-2010-1297 [489 bytes]
- (hist) Botnet construction, control and concealment [490 bytes]
- (hist) Encyclopedia entry: Win32/Oderoor [490 bytes]
- (hist) Le dropper de CTB-Locker [490 bytes]
- (hist) Flashback [494 bytes]
- (hist) CVE-2010-2883 [494 bytes]
- (hist) Leouncia - Yet another backdoor - Part 2 [496 bytes]
- (hist) Redkit : No more money ! Traffic US, CA, GB, AU [496 bytes]
- (hist) Tatanga attack exposes chipTAN weaknesses [498 bytes]
- (hist) Simplocker [501 bytes]
- (hist) CVE-2015-1671 [502 bytes]
- (hist) Emerging attack vectors - RSA slide deck [503 bytes]
- (hist) Storm [505 bytes]
- (hist) The Dorkbot rises [508 bytes]
- (hist) CVE-2015-3104 [508 bytes]
- (hist) ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar [512 bytes]
- (hist) Cimbot - A technical analysis [513 bytes]
- (hist) Owning Kraken zombies [515 bytes]
- (hist) Zeus variant Floki bot targets PoS data [515 bytes]
- (hist) Inside Upas Kit (1.0.1.1) aka Rombrast C&C - Botnet Control Panel [516 bytes]
- (hist) Adrenalin botnet. The trend marks the Russian crimeware [517 bytes]
- (hist) LockerGoga [517 bytes]
- (hist) Mac Flashback exploiting unpatched Java vulnerability [518 bytes]
- (hist) Necurs Quick Analysis [519 bytes]
- (hist) Hesperbot – A new, advanced banking trojan in the wild [520 bytes]
- (hist) Travnet [521 bytes]
- (hist) CVE-2003-0533 [521 bytes]
- (hist) Flame [522 bytes]
- (hist) URL redirection [523 bytes]
- (hist) Bomba Locker [524 bytes]
- (hist) The Pobelka botnet - a command and control case study [524 bytes]
- (hist) DaRK DDoSseR leads to Gh0st RAT [525 bytes]
- (hist) Black Dragon: "... and all will burn beneath the shadow of my wings" [525 bytes]
- (hist) Cerber Dominates Ransomware Landscape After Locky's Demise [525 bytes]
- (hist) CVE-2008-2463 [526 bytes]
- (hist) Ainslot [530 bytes]
- (hist) Blackhole Ramnit - samples and analysis [530 bytes]
- (hist) Nymaim [532 bytes]
- (hist) Botnet command server hidden in Tor [532 bytes]
- (hist) Poison Ivy [533 bytes]
- (hist) The first trojan in history to steal Linux and Mac OS X passwords [534 bytes]
- (hist) Skunkx DDoS bot analysis [535 bytes]
- (hist) Live Coronavirus Map Used to Spread Malware [535 bytes]
- (hist) LogPOS - new point of sale malware using mailslots [536 bytes]
- (hist) Massive Drop in number of active Zeus C&C servers [536 bytes]
- (hist) CVE-2015-3105 [536 bytes]
- (hist) Shedding light on the NeoSploit Exploit Kit [539 bytes]
- (hist) Carberp, the renaissance ? [539 bytes]
- (hist) Gendarmerie [542 bytes]
- (hist) Adneukine [543 bytes]
- (hist) Ransomware : Smile you're on camera - Reveton.C new landing pages [543 bytes]
- (hist) CVE-2013-1493 (jre17u15 - jre16u41) integrating exploit kits [543 bytes]
- (hist) New Mahdi updates, new C2 server [546 bytes]
- (hist) MSRT march: three hioles in one [552 bytes]
- (hist) Blackhole & Cridex: season 2 episode 1: Intuit spam & SSL traffic analysis [552 bytes]
- (hist) Redkit - one account = one color [553 bytes]
- (hist) Analysis of a VBScript bot [554 bytes]
- (hist) Tequila botnet leads to phishing attack [556 bytes]
- (hist) Herpes botnet [558 bytes]
- (hist) Analysis of a stage 3 Miniduke malware sample [559 bytes]
- (hist) CVE-2015-0311 (Flash up to 16.0.0.287) integrating Exploit Kits [560 bytes]
- (hist) Undefined-10 [560 bytes]
- (hist) CVE-2012-4681 - Redkit Exploit Kit - I want Porche Turbo [560 bytes]
- (hist) CryptXXX [566 bytes]
- (hist) ESET analyzes first Android file-encrypting, TOR-enabled ransomware [567 bytes]
- (hist) Metulji [568 bytes]
- (hist) Trend Micro discovers MalumPoS; malware targeting hotels and other US industries [569 bytes]
- (hist) IcoScript: using webmail to control malware [570 bytes]
- (hist) Undefined-04 [571 bytes]
- (hist) Carberp steals e-cash vouchers from Facebook users [572 bytes]
- (hist) Stolen passwords allowed hackers to steal over one billion rubles [572 bytes]
- (hist) Dridex learns new trick: P2P over HTTP [578 bytes]
- (hist) TreasureHunt: a custom POS malware tool [578 bytes]
- (hist) New Mac malware discovered on attendee computer at anti-surveillance workshop [580 bytes]
- (hist) CVE-2013-2471 [588 bytes]
- (hist) CVE-2010-0842 [590 bytes]
- (hist) Researchers: Bredolab still lurking, though severely injured [592 bytes]
- (hist) DNS: a botnet dialect [593 bytes]
- (hist) APT1: technical backstage [597 bytes]
- (hist) Five charged in largest hacking scheme ever prosecuted in US [597 bytes]
- (hist) Bredolab severely injured but not dead [599 bytes]
- (hist) An analysis of Dorkbot’s infection vectors (part 2) [600 bytes]
- (hist) NitlovePOS: another new POS malware [600 bytes]
- (hist) Alina: following the shadow part 1 [601 bytes]
- (hist) Ransom.JU [602 bytes]
- (hist) Ransomware Casier - Sharing Design with Lyposit - Gaelic & Persian ( [603 bytes]
- (hist) Carbanak: Multi-million dollar cybercrime gang focuses on banks rather than their customers [603 bytes]
- (hist) The Target breach by the numbers [604 bytes]
- (hist) Carberp: Silent trojan, eventual successor to ZeuS [607 bytes]
- (hist) Egypt Finfisher intrusion tools and ethics [607 bytes]
- (hist) Karagny.L unpack [608 bytes]
- (hist) MSRT April 2014 – Ramdo [608 bytes]
- (hist) Botnets [609 bytes]
- (hist) Malware analysis Rannoh/Matsnu [610 bytes]
- (hist) SamSam Ransomware Evolves Its Tactics Towards Targeting Whole Companies [612 bytes]
- (hist) Malware analysis tutorial 32: exploration of botnet client [613 bytes]
- (hist) Harvesting data on the Xarvester botmaster [613 bytes]
- (hist) An encounter with trojan Nap [615 bytes]
- (hist) Trojan horse using sender policy framework [617 bytes]
- (hist) The IMDDOS botnet: discovery and analysis [618 bytes]
- (hist) An overnight sensation — CoreBot returns as a full-fledged financial malware [618 bytes]
- (hist) Citadel trojan malware analysis [619 bytes]
- (hist) Tales from Crisis, Chapter 2: Backdoor’s first steps [621 bytes]
- (hist) Alina [621 bytes]
- (hist) New virus SMSZombie.A discovered by TrustGo Security Labs [622 bytes]
- (hist) Shylock [623 bytes]
- (hist) Sinowal: the evolution of MBR rootkit continues [625 bytes]
- (hist) Bleeding Life Exploit Pack [625 bytes]
- (hist) Buh-bye Beebone! Law enforcement kills polymorphic virus-spreading botnet [626 bytes]
- (hist) Library file in certain Android apps connects to C&C servers [627 bytes]
- (hist) ZeroAccess's way of self-deletion [628 bytes]
- (hist) Kore exploit kit [629 bytes]
- (hist) Panel Supern0va et virus gendarmerie [630 bytes]
- (hist) Zegost [633 bytes]
- (hist) Botnets on discount! [633 bytes]
- (hist) Android.Counterclank found in official Android market [635 bytes]
- (hist) Malware discovered developed with Google's "Go" programming language [635 bytes]
- (hist) Critroni crypto ransomware seen using Tor for command and control [636 bytes]
- (hist) Xtreme RAT [637 bytes]
- (hist) Fortiguard: Android/Stiniter.A!tr [637 bytes]
- (hist) Poison Ivy: assessing damage and extracting intelligence [637 bytes]
- (hist) Win32/Vundo [639 bytes]
- (hist) Over 9 million PCs infected - ZeroAccess botnet uncovered [640 bytes]
- (hist) PokerAgent botnet stealing over 16,000 Facebook credentials [640 bytes]
- (hist) Symantec/Android.Maistealer [641 bytes]
- (hist) PoisonIvy adapts to communicate through authentication proxies [641 bytes]
- (hist) Urausy has big plan for Europe - Targeting 3 new countries among which Norway ! [644 bytes]
- (hist) Jigsaw [646 bytes]
- (hist) Panel Gendarmerie [647 bytes]
- (hist) Avzahn [648 bytes]
- (hist) Virus scanners for virus authors [648 bytes]
- (hist) The DGA of Symmi [648 bytes]
- (hist) Linux/Cdorked.A: New Apache backdoor being used in the wild to serve Blackhole [649 bytes]
- (hist) Lights Out: Dragonfly is on the move [649 bytes]
- (hist) Source Code for IoT Botnet ‘Mirai’ Released [649 bytes]
- (hist) Kovter [650 bytes]
- (hist) Hackers are increasingly targeting IoT Devices with Mirai DDoS Malware [650 bytes]
- (hist) Frutas [651 bytes]
- (hist) Stealthy router-based botnet worm squirming [653 bytes]
- (hist) Gumblar Google-poisoning attack morphs [653 bytes]
- (hist) Analysis: Malware Win32/Rimecud.B [657 bytes]
- (hist) Neosploit gets Java 0-Day [658 bytes]
- (hist) Malware targeting Windows 8 uses Google Docs [658 bytes]
- (hist) ZeroAccess anti-debug uses debugger [659 bytes]
- (hist) Ransomware report: the rise of BandarChor [659 bytes]
- (hist) Probing the Gozi-Prinimalka campaign [661 bytes]
- (hist) Andromeda 2.7 features [661 bytes]
- (hist) CVE-2013-5330 (Flash) in an unknown Exploit Kit fed by high rank websites [661 bytes]
- (hist) And real name of Magnitude is.... [662 bytes]
- (hist) CVE-2004-0549 [663 bytes]
- (hist) Xarvester, the new Srizbi? [665 bytes]
- (hist) Inside the Grum botnet [666 bytes]
- (hist) Major shift in strategy for ZeroAccess rootkit malware, as it shifts to user-mode [666 bytes]
- (hist) Reveton can speak now ! [666 bytes]
- (hist) Fast look at an infection by a Blackhole Exploit Kit 2.0 [667 bytes]
- (hist) Smoke Bot [670 bytes]
- (hist) Avalanche phishers migrate to ZeuS [670 bytes]
- (hist) Koobface botnet master KrotReal back in business, distributes ransomware and promotes BHSEO service/product [672 bytes]
- (hist) Analysis of DarkMegi aka NpcDark [672 bytes]
- (hist) Olmasco bootkit: next circle of TDL4 evolution (or not) [676 bytes]
- (hist) TDL4 - Top Bot [677 bytes]
- (hist) ZeroAccess - new steps in evolution [678 bytes]
- (hist) The Epic Turla operation [678 bytes]
- (hist) CVE-2013-2465/CVE-2013-2471/CVE-2013-2463 integrating Exploit Kits -- jre7u21 CVE- jre6u45 and earlier [678 bytes]
- (hist) Uremtoo [680 bytes]
- (hist) The ‘Madi’ infostealers - a detailed analysis [680 bytes]
- (hist) Akbot [681 bytes]
- (hist) Symantec/W32.Zorenium [681 bytes]
- (hist) Festi [683 bytes]
- (hist) FakeM [684 bytes]
- (hist) Locky Ransomware switches to the Lukitus extension for Encrypted Files [684 bytes]
- (hist) BandarChor [686 bytes]
- (hist) TorrentLocker ransomware uses email authentication to refine spam runs [687 bytes]
- (hist) MDK: the largest mobile botnet in China [689 bytes]
- (hist) Introducing Ponmocup-Finder [691 bytes]
- (hist) The Andromeda/Gamarue botnet is on the rise again [691 bytes]
- (hist) The good , the bad and the unknown online scanners [691 bytes]
- (hist) Analysis of TDL4 [692 bytes]
- (hist) 'Tigger' trojan keeps security researchers hopping [693 bytes]
- (hist) Punkey [693 bytes]
- (hist) Symantec/Backdoor.Arcomrat [697 bytes]
- (hist) MMD-0056-2016 - Linux/Mirai, how an old ELF malcode is recycled [697 bytes]
- (hist) OSX.iService its not going to iWork for you [700 bytes]
- (hist) The “Hikit” rootkit: advanced and persistent attack techniques (part 2) [700 bytes]
- (hist) Maazben: best of both worlds [704 bytes]
- (hist) ScarePakage [705 bytes]
- (hist) The resurrection of RedKit [705 bytes]
- (hist) MoVP 1.3 Desktops, heaps, and ransomware [706 bytes]
- (hist) SamSam ransomware designed to inundate targeted networks with thousands of copies of itself [706 bytes]
- (hist) Reveton Autumn Collection += AU,CZ, IE, NO & 17 new design [708 bytes]
- (hist) Andromeda [709 bytes]
- (hist) Dorifel [709 bytes]
- (hist) Urausy improving its localization - A (the\?) Gaelic Ransomware with Interpol impersonation as default landing [710 bytes]
- (hist) The life cycle of web server botnet recruitment [710 bytes]
- (hist) CVE-2012-0158 [710 bytes]
- (hist) MSRT November '12 - Weelsof around the world [711 bytes]
- (hist) Tis the season for shipping and phishing [712 bytes]
- (hist) REvil ransomware gang's web sites mysteriously shut down [714 bytes]
- (hist) Cool Exploit Kit - A new Browser Exploit Pack on the Battlefield with a "Duqu" like font drop [716 bytes]
- (hist) A quick update on spambot Kelihos [716 bytes]
- (hist) Reveton += HU, LV, SK, SI, TR (!), RO - So spreading accross Europe with 6 new Design [717 bytes]
- (hist) Chameleon botnet grabbed $6m A MONTH from online ad-slingers [717 bytes]
- (hist) Citadel V1.3.5.1: enter the fort’s dungeons [720 bytes]
- (hist) ZeroLocker won't come to your rescue [720 bytes]
- (hist) DDoS attacks: the Zemra bot [721 bytes]
- (hist) Backdoor uses Evernote as command and control server [721 bytes]
- (hist) Oderoor [722 bytes]
- (hist) Insights into Win32/Bradop [722 bytes]
- (hist) NASK shuts down dangerous Virut botnet domains [722 bytes]
- (hist) ZeuS – P2P+DGA variant – mapping out and understanding the threat [724 bytes]
- (hist) Trojan ChePro, the CPL storm [725 bytes]
- (hist) The world's biggest botnets [726 bytes]
- (hist) Win32/Virlock: First Self-Reproducing Ransomware is also a Shape Shifter [727 bytes]
- (hist) New CryptoLocker spreads via removable drives [727 bytes]
- (hist) Trojan.Tatanarg.B careful! [730 bytes]
- (hist) Internet Census 2012, port scanning /0 using insecure embedded devices [730 bytes]
- (hist) PETYA crypto-ransomware overwrites MBR to lock users out of their computers [731 bytes]
- (hist) Bot of the day: Ramnit/Ninmul [733 bytes]
- (hist) VertexNet [734 bytes]