Pages that link to "2012"
← 2012
Jump to navigation
Jump to search
The following pages link to 2012:
Displayed 500 items.
View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)- ZeroAccess (← links)
- Android trojan used to create simple SMS spam botnet (← links)
- Andrew Conway (← links)
- SpamSoldier (← links)
- Accdfisa (← links)
- MoVP 1.3 Desktops, heaps, and ransomware (← links)
- Michael Hale Ligh (← links)
- Tigger (← links)
- The ACCDFISA malware family – Ransomware targeting Windows servers (← links)
- Gozi (← links)
- Ackposts (← links)
- Symantec/Android.Ackposts (← links)
- Regin (← links)
- Reveton (← links)
- CVE-2013-2465 (← links)
- Brett Stone-Gross (← links)
- Christopher Kruegel (← links)
- Admin.HLP (← links)
- New trojan found: Admin.HLP leaks organizations data (← links)
- Eyal Benishti (← links)
- Robert Lipovsky (← links)
- NjRAT (← links)
- Adneukine (← links)
- ProPack (← links)
- CVE-2012-4681 (← links)
- CVE-2012-5076 (← links)
- CVE-2012-5076 - Massively adopted - Blackhole update to 2.0.1 (← links)
- Blackhole (← links)
- Jorge Mieres (← links)
- Rootkit (← links)
- Ainslot (← links)
- Akbot (← links)
- TDSS (← links)
- Andromeda (← links)
- Arcom (← links)
- CVE-2015-0311 (← links)
- Angler (← links)
- RIG (← links)
- Fiesta (← links)
- Nuclear Pack (← links)
- KaiXin (← links)
- Java Runtime Environment 1.7 Zero-Day Exploit Delivers Backdoor (← links)
- Manuel Gatbunton (← links)
- New Chinese exploit pack (← links)
- CVE-2012-0507 (← links)
- CVE-2012-1723 (← links)
- Goldenbaks (← links)
- Bamital (← links)
- BlackEnergy (← links)
- BlackShades (← links)
- Bredolab (← links)
- Carberp (← links)
- Casier (← links)
- Chameleon (← links)
- Chidol (← links)
- Citadel (← links)
- Conficker (← links)
- Cridex (← links)
- Cutwail (← links)
- DaRK DDoSseR (← links)
- DarkComet (← links)
- Darkness (← links)
- Dirt Jumper (← links)
- DistTrack (← links)
- Donbot (← links)
- Dorifel (← links)
- Dorkbot (← links)
- Duqu (← links)
- Encriyoko (← links)
- Epubb (← links)
- Feederbot (← links)
- Festi (← links)
- Fivetoone (← links)
- Flame (← links)
- Flashback (← links)
- Gameover (← links)
- Gauss (← links)
- Gema (← links)
- Gimemo (← links)
- Gh0st RAT (← links)
- Prinimalka (← links)
- Grum (← links)
- HerpesNet (← links)
- Hikit (← links)
- IceIX (← links)
- Jagfu (← links)
- Khan (← links)
- Karn!v0r3x (← links)
- Kelihos (← links)
- Koobface (← links)
- Lyposit (← links)
- Madi (← links)
- Makadocs (← links)
- Malex (← links)
- Medfos (← links)
- Mirage (← links)
- Mlano (← links)
- Monkif (← links)
- MP-DDoser (← links)
- Nitol (← links)
- Nitro (← links)
- Pandora (← links)
- PickPocket (← links)
- PlugX (← links)
- Pobelka (← links)
- PokerAgent (← links)
- Ponmocup (← links)
- Pony (← links)
- Pramro (← links)
- PTA (← links)
- Ramnit (← links)
- Ranbyus (← links)
- Rannoh (← links)
- Ransom.HY (← links)
- Ransom.II (← links)
- Ransom.JU (← links)
- Shylock (← links)
- Silence Locker (← links)
- Silent Winlocker (← links)
- Silon (← links)
- Smoke Bot (← links)
- SMSZombie (← links)
- SpyEye (← links)
- Srizbi (← links)
- Storm (← links)
- Studma (← links)
- Supern0va (← links)
- Sykipot (← links)
- TDL-4 (← links)
- TDL-3 (← links)
- DGAv14 (← links)
- Taidoor (← links)
- Tatanarg (← links)
- Tatanga (← links)
- Thor (← links)
- Tilon (← links)
- Tinba (← links)
- Torpig (← links)
- ULocker (← links)
- Undefined-10 (← links)
- Upas (← links)
- Urausy (← links)
- Vicas (← links)
- Virut (← links)
- VOlk (← links)
- Waledac (← links)
- Weelsof (← links)
- Wiper (← links)
- Wirenet (← links)
- Xarvester (← links)
- Xpaj (← links)
- Xtreme RAT (← links)
- Ysreef (← links)
- Zegost (← links)
- Zemra (← links)
- ZeuS (← links)
- Sakura (← links)
- ZeuS – P2P+DGA variant – mapping out and understanding the threat (← links)
- Who's behind the Koobface botnet? - An OSINT analysis (← links)
- Nuevo botnet contra Mexico: Karn!v0r3x (← links)
- Part virus, part botnet, spreading fast: Ramnit moves past Facebook passwords (← links)
- Blackhole Ramnit - samples and analysis (← links)
- Malware 2 - from infection to persistence (← links)
- Carberp steals e-cash vouchers from Facebook users (← links)
- Citadel trojan touts trouble-ticket system (← links)
- Top 50 bad hosts & networks 2011 Q4 (← links)
- Citadel ZeuS bot (← links)
- Kelihos/Hlux botnet returns with new techniques (← links)
- RootSmart malware utilizes GingerBreak root exploit (← links)
- Security Response Android.Counterclank (← links)
- Android.Counterclank found in official Android market (← links)
- Android.Bmaster: A million-dollar mobile botnet (← links)
- RootSmart Android malware (← links)
- Acquisition and analysis of volatile memory from Android devices (← links)
- SpyEye being kicked to the curb by its customers? (← links)
- TDL4 reloaded: Purple Haze all in my brain (← links)
- The where and why of Hlux (← links)
- Who's behind the world's largest spam botnet? (← links)
- One bot to rule them all (← links)
- Panda Security uncovers bot-killing malware (← links)
- Bot shopping with my wife (← links)
- Long life to Kelihos! (← links)
- IRC bot for Android (← links)
- Pramro and Sality - two PEs in a pod (← links)
- ZeuSbot/Spyeye P2P updated, fortifying the botnet (← links)
- Rovnix Reloaded: new step of evolution (← links)
- Cutwail drives spike in malicious HTML attachment spam (← links)
- Playing cops & robbers with banks & browsers (← links)
- The Cridex trojan targets 137 financial organizations in one go (← links)
- Anonymous supporters tricked into installing ZeuS trojan (← links)
- Sinowal analysis (Windows 7, 32-bit) (← links)
- Kelihos back in town using Fast Flux (← links)
- Scareware locks down computer due to child porn and terrorism (← links)
- Domain generation algorithms (DGA) in stealthy malware (← links)
- McAfee Labs threat advisory : W32.Pinkslipbot (← links)
- DNS: a botnet dialect (← links)
- The mystery of the Duqu framework (← links)
- Reversing the wrath of Khan (← links)
- It’s 2012 and Armageddon has arrived (← links)
- Not just a one-trick PonyDOS (← links)
- A peek inside the Darkness (Optima) DDoS Bot (← links)
- Emerging attack vectors - RSA slide deck (← links)
- Kelihos: not alien resurrection, more attack of the clones (← links)
- Citadel : le fichier de configuration (← links)
- MSRT March 2012: breaking bad (← links)
- New Thor botnet nearly ready to be sold, price $8,000 (← links)
- Android malware pairs man-in-the-middle with remote-controlled banking trojan (← links)
- SIM-ple: mobile handsets are weak link in latest online banking fraud scheme (← links)
- It’s not the end of the world: DarkComet misses by a mile (← links)
- Ransomware: playing on your fears (← links)
- MSRT march: three hioles in one (← links)
- ZeuS: me talk pretty Finnish one day (← links)
- An interesting case of JRE sandbox breach (CVE-2012-0507) (← links)
- Members of the largest criminal group engaged in online banking fraud are detained (← links)
- Dutch users served Sinowal for lunch (← links)
- China targets macs used by NGOs (← links)
- New Duqu sample found in the wild (← links)
- Bredolab botmaster ‘Birdie’ still at large (← links)
- From Georgia, with love Win32/Georbot (← links)
- Security alert: new TGLoader Android malware utilizes the exploid root exploit (← links)
- Actually, my name is Duqu - Stuxnet is my middle name (← links)
- Microsoft and financial services industry leaders target cybercriminal operations from ZeuS botnets (← links)
- Now you Z-(eus) it, now you don’t: ZeuS bots silently upgraded to Citadel (← links)
- Carberp: it’s not over yet (← links)
- Trojan.Taidoor takes aim at policy think tanks (← links)
- P2P botnet Kelihos.B with 100.000 nodes sinkholed (← links)
- Botnet shutdown success story - again: disabling the new Hlux/Kelihos botnet (← links)
- Kelihos is dead. Long live Kelihos (← links)
- Blackhole, CVE-2012-0507 and Carberp (← links)
- Fortiguard: Android/Stiniter.A!tr (← links)
- Trojan moves its configuration to Twitter, LinkedIn, MSDN and Baidu (← links)
- The mystery of Duqu framework solved (← links)
- The mystery of Duqu: part ten (← links)
- Trojan.ZeroAccess infection analysis (← links)
- FAQ on Kelihos.B/Hlux.B sinkholing (← links)
- Richard Clarke on who was behind the Stuxnet attack (← links)
- Trojan on the loose: an in-depth analysis of police trojan (← links)
- Security alert: new variants of Legacy Native (LeNa) identified (← links)
- Doctor Web exposes 550 000 strong Mac botnet (← links)
- A DDoS family affair: Dirt Jumper bot family continues to evolve (← links)
- Flashfake Mac OS X botnet confirmed (← links)
- Doctor Web a détecté un botnet enrôlant plus de 550 000 Mac (← links)
- Apple releases Java update; includes fix for vulnerability exploited by Flashback malware (← links)
- Security alert: new Android malware - TigerBot - identified in alternative markets (← links)
- ZeuS v2 Malware Analysis - Part II (← links)
- MSRT April 2012: Win32/Claretore (← links)
- The ZeroAccess rootkit (← links)
- Malware Memory Analysis - Volatility (← links)
- DarkMegi rootkit - sample (distributed via Blackhole) (← links)
- Darkmegi: this is not the Rootkit you’re looking for (← links)
- Rmnet.12 created a million Windows computer botnet (← links)
- Latest SpyEye botnet active and cheaper (← links)
- Digging into the Nitol DDoS botnet (← links)
- Ransomware and Silence Locker control panel (← links)
- The ACCDFISA malware family – Ransomware targetting Windows servers (← links)
- SIRv12: the obstinacy of Conficker (← links)
- SIRv12 (← links)
- Ransomware crimeware kits (← links)
- Attackers place Command and Control servers inside enterprise walls (← links)
- Measuring botnet populations (← links)
- Nitol DDoS botnet discovered in China (← links)
- Ransomware gets professional, targeting Switzerland, Germany and Austria (← links)
- Police Trojan crosses the Atlantic, now targets USA and Canada (← links)
- Multitenancy Botnets thwart threat analysis (← links)
- King of spam:Festi botnet analysis (← links)
- Etude sur le fonctionnement du Trojan.Matsnu.1 codant les données des utilisateurs (← links)
- Reveton.A (← links)
- HerpesNet botnet 1.7 (← links)
- ZeuS ransomware feature: win unlock (← links)
- SKyWIper: A complex malware for targeted attacks (← links)
- The Flame: questions and answers (← links)
- Meet ‘Flame’, the massive spy malware infiltrating Iranian computers (← links)
- Flamer: highly sophisticated and discreet threat targets the Middle East (← links)
- Dirt Jumper DDoS bot increasingly popular (← links)
- Ransomware ‘Holds Up’ victims (← links)
- Say hello to Tinba: world’s smallest trojan-banker (← links)
- Obama order sped up wave of cyberattacks against Iran (← links)
- W32.Flamer: spreading mechanism tricks and exploits (← links)
- Trojan.Tatanarg.B careful! (← links)
- Smartcard vulnerabilities in modern banking malware (← links)
- Sinowal: MBR rootkit never dies! (and it always brings some new clever features) (← links)
- Flamer: urgent suicide (← links)
- Flame: replication via Windows Update MITM proxy (← links)
- MP-DDoser: A rapidly improving DDoS threat (← links)
- MP-DDoser:Monitoring a rapidly improving DDoS threat (← links)
- Crypto breakthrough shows Flame was designed by world-class scientists (← links)
- Library file in certain Android apps connects to C&C servers (← links)
- Back to Stuxnet: the missing link (← links)
- You dirty RAT! Part 1 – DarkComet (← links)
- MSRT June '12 - cleanup on aisle one (← links)
- ZeroAccess's way of self-deletion (← links)
- A chat with NGR Bot (← links)
- Large-scale analysis of malware downloaders (← links)
- Insights into Win32/Bradop (← links)
- You dirty RAT! part 2 – BlackShades NET (← links)
- Proactive policy measures by Internet service providers against Botnets (← links)
- Shylock financial malware back 'with a vengeance' (← links)
- Digging inside Tinba malware - A walkthrough (← links)
- Fake FBI Ransomware analysis (← links)
- BotGrep: finding P2P bots with structured graph analysis (← links)
- XPAJ: reversing a Windows x64 bootkit (← links)
- Analysis of functions used to encode strings in Flame (GDB script) (← links)
- ZeroAccess - new steps in evolution (← links)
- Carberp gang evolution: CARO 2012 presentation (← links)
- More Flame/Skywiper CNC behavior uncovered (← links)
- ZeroAccess: code injection chronicles (← links)
- Ponmocup analysis (← links)
- Introducing Ponmocup-Finder (← links)
- DDoS attacks: the Zemra bot (← links)
- Win32/Gataka: a banking Trojan ready to take off (← links)
- W32.Shadesrat (Blackshades) author arrested (← links)
- QuickPost: Flame & Volatility (← links)
- Get gamed and rue the day... (← links)
- Relentless Zbot and anti-emulations (← links)
- Monkif botnet hides commands in JPEGs (← links)
- Kaspersky Lab et Seculert annoncent la récente découverte de « Madi », une nouvelle attaque de cyberespionnage au Moyen‑Orient (← links)
- Flame, Duqu and Stuxnet: in-depth code analysis of mssecmgr.ocx (← links)
- Rovnix bootkit framework updated (← links)
- Madi is back - New Tricks and a new Command&Control server (← links)
- The Madi campaign - Part II (← links)
- Rovnix.D: the code injection story (← links)
- Dorkbot: conquistando Latinoamérica (← links)
- The ‘Madi’ infostealers - a detailed analysis (← links)
- Winlock affiliate (← links)
- EURO Winlocker (← links)
- Flamer analysis: framework reconstruction (← links)
- Gangstaservice Winlock Affiliate (← links)
- Gauss: Nation-state cyber-surveillance meets banking Trojan (← links)
- Dorifel crypto malware paralyzes Dutch companies and public sector (← links)
- Dorifel is much bigger than expected and it’s still active and growing! (← links)
- More details of the Dorifel servers (← links)
- De code van Dorifel nader bekeken (← links)
- Joint strike force against Dorifel (← links)
- Dorifel virus gereed voor Nederlandse banking phishing (← links)
- Panel Virus Gendarmerie : Ratio 0.36% (← links)
- Gauss: abnormal distribution (← links)
- Panel Supern0va et virus gendarmerie (← links)
- Win32/Gataka banking Trojan - Detailed analysis (← links)
- Crypto experts called on to crack cyberspy tool's encryption (← links)
- What’s the buzz with Bafruz (← links)
- ZACCESS/SIREFEF arrives with new infection technique (← links)
- Interconnection of Gauss with Stuxnet, Duqu & Flame (← links)
- Malware analysis tutorial 32: exploration of botnet client (← links)
- Dorifel/Quervar: the support scammer’s secret weapon (← links)
- Analyzing a new exploit pack (← links)
- Spam botnets: The fall of Grum and the rise of Festi (← links)
- Targeted destructive malware explained: Troj/Mdrop-ELD (← links)
- Disttrack sabotage malware wipes data at unnamed Middle East energy organization (← links)
- Shamoon the wiper - copycats at work (← links)
- Saudi Aramco hit by computer virus (← links)
- Mac Flashback exploiting unpatched Java vulnerability (← links)
- Analyse et poncage du botnet HerpesNet (← links)
- Analyse statique de Duqu stage 1 (← links)
- Analyse statique de Duqu stage 2 (← links)
- Analyse de Xtreme RAT (← links)
- Disttrack malware overwrites files, infects MBR (← links)
- Nepalese government websites compromised to serve Zegost RAT (← links)
- New virus SMSZombie.A discovered by TrustGo Security Labs (← links)
- Inside the Grum botnet (← links)
- AutoIT ransomware (← links)
- Shamoon the Wiper in details (← links)
- Quervar – Induc.C reincarnate (← links)
- Newly detected Crisis virus infects Windows, Macs and virtual machines (← links)
- OSX/Crisis has been used as part of a targeted attack (← links)
- New Apple Mac trojan called OSX/Crisis discovered (← links)
- Crisis for Windows sneaks onto virtual machines (← links)
- Guys behind Gauss and Flame are the same (← links)
- Analysis of the Finfisher lawful interception malware (← links)
- Apple zombie malware 'NetWeird' rummages for browser and email passwords (← links)
- An analysis of the cross-platform backdoor NetWeirdRC (← links)
- Tales from Crisis, Chapter 1: The dropper’s box of tricks (← links)
- Tales from Crisis, Chapter 2: Backdoor’s first steps (← links)
- Tales from Crisis, Chapter 3: The Italian rootkit job (← links)
- The “Hikit” rootkit: advanced and persistent attack techniques (part 2) (← links)
- The “Hikit” rootkit: advanced and persistent attack techniques (part 1) (← links)
- W32.Changeup: how the worm was created (← links)
- Tilon-son of Silon (← links)
- Tales from Crisis, Chapter 4: a ghost in the network (← links)
- Ransomware Fake Microsoft Security Essentials (← links)
- What was that Wiper thing? (← links)
- Inside Ulocker (← links)
- Mahdi malware finds 150 new targets including U.S. and Germany, gets more evasive (← links)
- New Mahdi updates, new C2 server (← links)
- Новый сэмпл Pandora DDoS Bot (← links)
- The first trojan in history to steal Linux and Mac OS X passwords (← links)
- Malware hunting with the Sysinternals tools (← links)
- Virus Gendarmerie : variante Office Centrale de Luttre contre la criminalité – controle informationnel (← links)
- Panel Gendarmerie (← links)
- Weelsof use SSL C&C (← links)
- Karagny.L unpack (← links)
- Java Zero-Days and the Blackhole Exploit Kit (← links)
- Reversing malware loaders - The Matsnu-A Case (← links)
- The Elderwood project (infographic) (← links)
- Anaru malware now live and ready to steal (← links)
- Shamoon the Wiper: further details (Part II) (← links)
- A study on botnet detection techniques (← links)
- Malware analysis Rannoh/Matsnu (← links)
- W32.Tinba (Tinybanker) The turkish incident (← links)
- Microsoft disrupts the emerging Nitol botnet being spread through an unsecure supply chain (← links)
- MSRT September '12 - Medfos, hijacking your daily search (← links)
- Tracking down the author of the PlugX RAT (← links)
- PlugX: new tool for a not so new campaign (← links)
- Full analysis of Flame's Command & Control servers (← links)
- Ransomware « Trojan.Casier » Panel (← links)
- NGRBot spreads via chat (← links)
- Over 9 million PCs infected - ZeroAccess botnet uncovered (← links)
- Major shift in strategy for ZeroAccess rootkit malware, as it shifts to user-mode (← links)
- The ZeroAccess botnet: mining and fraud for massive financial gain (← links)
- Full analysis of Flame's command & control servers (← links)
- Malware discovered developed with Google's "Go" programming language (← links)
- Analysis of Ysreef (a variant of Tobfy) (← links)
- ZeuS Gameover overview (← links)
- Neosploit gets Java 0-Day (← links)
- Analysis of a “/0” stealth scan from a botnet (← links)
- New ransomware plays its victims an audio file, over and over and over… (← links)
- BoteAR: a “social botnet”- What are we talking about (← links)
- An overview of exploit packs (← links)
- Sopelka Botnet: three banking trojans and one banking panel (← links)
- TDI - a new element in old TDSS story (← links)
- Citadel V1.3.5.1: enter the fort’s dungeons (← links)
- Blackhole & Cridex: season 2 episode 1: Intuit spam & SSL traffic analysis (← links)
- A new iteration of the TDSS/TDL-4 malware using DGA-based command and control (← links)
- Olmasco bootkit: next circle of TDL4 evolution (or not) (← links)
- Inside Smoke Bot - botnet control panel (← links)
- From Sakura to Reveton via Smoke Bot - or a botnet distribution of Reveton (← links)
- The lifecycle of peer-to-peer (Gameover) ZeuS (← links)
- Blackhole exploit kit v2 on the rise (← links)
- The Dorkbot rises (← links)
- Analysis of TDL4 (← links)
- DISCLOSURE: detecting botnet command and control servers through large-scale NetFlow analysis (← links)
- Armenian Bredolab creator jailed for computer sabotage (← links)
- Unveiling the network criminal infrastructure of TDSS/TDL4 - DGAv14: a case study on a new TDSS/TDL4 variant (← links)
- Cracking the encrypted C&C protocol of the ZeroAccess botnet (← links)
- Trojan.Prinimalka: bits and pieces (← links)
- ‘Project Blitzkrieg’ promises more aggressive cyberheists against U.S. banks (← links)
- Cyber gang seeks botmasters to wage massive wave of trojan attacks against U.S. banks (← links)
- Static analysis of Dalvik bytecode and reflection in Android (← links)
- Legal implications of countering botnets (← links)
- Meet CritXPack (Previously Vintage Pack) (← links)
- Probing the Gozi-Prinimalka campaign (← links)
- Malware targeting Windows 8 uses Google Docs (← links)
- Cool exploit kit - URL structure (← links)
- Citadel: a cyber-criminal’s ultimate weapon? (← links)
- DaRK DDoSseR leads to Gh0st RAT (← links)
- An analysis of Dorkbot’s infection vectors (part 2) (← links)
- Proactive detection of security incidents II - Honeypots (← links)
- Harvesting data on the Xarvester botmaster (← links)
- Ramnit goes social (← links)
- New Xtreme RAT attacks US, Israel, and other foreign governments (← links)
- Meet ProPack Exploit Pack - yes that's a lot of pack (← links)
- Upas Kit (aka Rombrast) integrates webinjects (← links)
- Inside Upas Kit (1.0.1.1) aka Rombrast C&C - Botnet Control Panel (← links)
- Urausy improving its localization - A (the\?) Gaelic Ransomware with Interpol impersonation as default landing (← links)
- Cool Exploit Kit - A new Browser Exploit Pack on the Battlefield with a "Duqu" like font drop (← links)
- Cool EK : "Hello my friend..." CVE-2012-5076 (← links)
- Reveton += HU, LV, SK, SI, TR (!), RO - So spreading accross Europe with 6 new Design (← links)
- Reveton Autumn Collection += AU,CZ, IE, NO & 17 new design (← links)
- Reveton can speak now ! (← links)
- Behind the Captcha or Inside Blackhole Exploit Kit 2.0 - Exploit Kit Administration Panel (← links)
- Redkit : No more money ! Traffic US, CA, GB, AU (← links)
- Ransomware Casier - Sharing Design with Lyposit - Gaelic & Persian ( (← links)
- CVE-2012-4681 - Redkit Exploit Kit - I want Porche Turbo (← links)
- Inside Smoke Bot - Botnet Control Panel (← links)
- Gimemo wants to play in the big league (← links)
- Update to Citadel : v.1.3.4.5 (← links)
- Ransomware : Smile you're on camera - Reveton.C new landing pages (← links)
- Redkit - one account = one color (← links)
- Inside Pony 1.7 / Fareit C&C - Botnet Control Panel (← links)
- Inside Andromeda Bot v2.06 Webpanel / AKA Gamarue - Botnet Control Panel (← links)
- Gimemo finally targeting USA with Camera Feature too (← links)
- Inside Blackhole Exploits Kit v1.2.4 - Exploit Kit Control Panel (← links)
- Inside Citadel 1.3.4.5 C&C & Builder - Botnet Control Panel (← links)
- Ransom.II - UGC payment for USA - Windows Genuine impersonation for DE (← links)
- CVE-2012-4681 - On its way to Sakura Exploit Kit too (← links)
- CVE-2012-4681 - Связка Sweet Orange (← links)
- Fast look at an infection by a Blackhole Exploit Kit 2.0 (← links)
- 1940 IPs for a BHEK/ULocker server - Nexcess-Net (← links)
- Urausy has big plan for Europe - Targeting 3 new countries among which Norway ! (← links)
- Update to Citadel : 1.3.5.1 Rain Edition. (← links)
- Boxer SMS trojan: malware as a global service (← links)
- Koobface botnet master KrotReal back in business, distributes ransomware and promotes BHSEO service/product (← links)
- Tatanga attack exposes chipTAN weaknesses (← links)
- Win32/Gataka - or should we say Zutick? (← links)
- Inside view of Lyposit aka (for its friends) Lucky LOCKER (← links)
- TDSS botnet: full disclosure (← links)
- Festi botnet analysis & investigation (← links)
- Unexpected reboot: Necurs (← links)
- MSRT November '12 - Weelsof around the world (← links)
- A quick update on spambot Kelihos (← links)
- Carberp-in-the-Mobile (← links)
- Inside Impact exploit kit (← links)
- Carberp, the renaissance ? (← links)
- Getting more "personal" & deeper into Cridex with parfeit credential stealer infection (← links)
- Study of malware obfuscation techniques (← links)
- Win32/Spy.Ranbyus modifying Java code in RBS Ukraine systems (← links)
- Malware attacking POS systems (← links)
- Malicious Apache module used for content injection: Linux/Chapro.A (← links)
- Malicious Apache module injects Iframes (← links)
- Security alert: SpamSoldier (← links)
- The Pobelka botnet - a command and control case study (← links)