Pages that link to "Template:Quotation"
Jump to navigation
Jump to search
The following pages link to Template:Quotation:
Displayed 289 items.
View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)- Security alert: SpamSoldier (transclusion) (← links)
- The Pobelka botnet - a command and control case study (transclusion) (← links)
- Exploring the market for stolen passwords (transclusion) (← links)
- Análisis del comportamiento de VOlk y sus funcionalidades (transclusion) (← links)
- Confidential documents from Japanese politics stolen by malware (transclusion) (← links)
- HTran and the Advanced Persistent Threat (transclusion) (← links)
- Stamp EK (aka SofosFO) now showing "Blackhole 2.0 Like" landing pages (transclusion) (← links)
- The "Red October" campaign - An advanced cyber espionage network targeting diplomatic and government agencies (transclusion) (← links)
- Waledac gets cozy with Virut (transclusion) (← links)
- Analysis of the malware of Red October - Part 1 (transclusion) (← links)
- Analysis of the malware of Red October - Part 2 (transclusion) (← links)
- NASK shuts down dangerous Virut botnet domains (transclusion) (← links)
- Under the hood of the cyber attack on U.S. banks (transclusion) (← links)
- Trojan horse using sender policy framework (transclusion) (← links)
- MDK: the largest mobile botnet in China (transclusion) (← links)
- Detecting extended attributes (ZeroAccess) and other Frankenstein’s monsters with HMFT (transclusion) (← links)
- Attention! All data on your hardrive is encrypted (transclusion) (← links)
- Inside the world of the Citadel trojan (transclusion) (← links)
- Demystifying Pobelka (transclusion) (← links)
- PokerAgent botnet stealing over 16,000 Facebook credentials (transclusion) (← links)
- Got malware? Rent an exploit service (transclusion) (← links)
- ‘Dexter’ virus targets point-of-sale terminals (transclusion) (← links)
- Bot herders build newer versions of previous botnet Waledac (transclusion) (← links)
- Virut malware fuels Waledac botnet resurgence (transclusion) (← links)
- Kelihos botnet appears again with new variant (transclusion) (← links)
- Trojan Nap aka Kelihos/Hlux - Feb. 2013 status update (transclusion) (← links)
- An encounter with trojan Nap (transclusion) (← links)
- Cross-platform Frutas RAT builder and back door (transclusion) (← links)
- Adobe Flash Player 0-day and HackingTeam's Remote Control System (transclusion) (← links)
- Trojan.Ransomgerpo criminal arrested (transclusion) (← links)
- Malware evolving to defeat anti-DDoS services like CloudFlare? (transclusion) (← links)
- Urausy: Colorfull design refresh (+HR) & EC3 Logo (transclusion) (← links)
- The Mirage campaign (transclusion) (← links)
- Industrial espionage and targeted attacks: understanding the characteristics of an escalating threat (transclusion) (← links)
- Takeover of Virut domains (transclusion) (← links)
- Massive search fraud botnet seized by Microsoft and Symantec (transclusion) (← links)
- Microsoft and Symantec take down Bamital botnet that hijacks online searches (transclusion) (← links)
- The MiniDuke mystery: PDF 0-day government spy assembler 0x29A micro backdoor (transclusion) (← links)
- Miniduke (transclusion) (← links)
- Latest Kelihos botnet shut down live at RSA Conference 2013 (transclusion) (← links)
- Kelihos is dead… No wait… Long live Kelihos! Again! (transclusion) (← links)
- The life cycle of web server botnet recruitment (transclusion) (← links)
- CVE-2013-1493 (jre17u15 - jre16u41) integrating exploit kits (transclusion) (← links)
- Mastermind behind Gozi bank malware charged along with two others (transclusion) (← links)
- Chameleon botnet grabbed $6m A MONTH from online ad-slingers (transclusion) (← links)
- Discovered: botnet costing display advertisers over six million dollars per month (transclusion) (← links)
- Citadel plitfi botnet report (transclusion) (← links)
- Hello Neutrino ! (just one more Exploit Kit) (transclusion) (← links)
- Travnet botnet steals huge amount of sensitive data (transclusion) (← links)
- Travnet trojan could be part of APT campaign (transclusion) (← links)
- Linux/Cdorked.A: New Apache backdoor being used in the wild to serve Blackhole (transclusion) (← links)
- Apache binary backdoors on Cpanel-based servers (transclusion) (← links)
- Mysterious Avatar rootkit with API, SDK, and Yahoo Groups for C&C communication (transclusion) (← links)
- Lifting the lid on the Redkit exploit kit (Part 1) (transclusion) (← links)
- New crimeware attacks LatAm bank users (transclusion) (← links)
- Inside Styx exploit kit control panel (transclusion) (← links)
- Unveiling an Indian cyberattack infrastructure - a special report (transclusion) (← links)
- Targeted information stealing attacks in South Asia use email, signed binaries (transclusion) (← links)
- OSX Kitmos analysis (transclusion) (← links)
- Mac spyware found at Oslo Freedom Forum (transclusion) (← links)
- New Mac malware discovered on attendee computer at anti-surveillance workshop (transclusion) (← links)
- Reversing Andromeda-Gamarue botnet (transclusion) (← links)
- Analysis of a PlugX malware variant used for targeted attacks (transclusion) (← links)
- Analysis of a stage 3 Miniduke malware sample (transclusion) (← links)
- Collateral damage: Microsoft hits security researchers along with Citadel (transclusion) (← links)
- The most sophisticated Android trojan (transclusion) (← links)
- Going solo: self-propagating ZBOT malware spotted (transclusion) (← links)
- Necurs Quick Analysis (transclusion) (← links)
- ZeuS-P2P monitoring and analysis (transclusion) (← links)
- Mac BackDoor.Wirenet.1 config extractor (transclusion) (← links)
- Analyse of the sample cdorked.A (transclusion) (← links)
- Poison Ivy 2.3.0 Documentation (transclusion) (← links)
- APT1: technical backstage (transclusion) (← links)
- Chapro.A source code (transclusion) (← links)
- Malware Uses Google Go Language (transclusion) (← links)
- BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection (transclusion) (← links)
- Analysis: Malware Win32/Rimecud.B (transclusion) (← links)
- The ZeroAccess botnet revealed (transclusion) (← links)
- Look what I found: it's a Pony! (transclusion) (← links)
- PeerRush: mining for unwanted P2P traffic (transclusion) (← links)
- FBI ransomware now targeting Apple’s Mac OS X users (transclusion) (← links)
- Kore exploit kit (transclusion) (← links)
- The rise of TOR-based botnets (transclusion) (← links)
- ZeroAccess anti-debug uses debugger (transclusion) (← links)
- Black Dragon: "... and all will burn beneath the shadow of my wings" (transclusion) (← links)
- Urausy ransomware - July 2013 design refresh - "Summer 2013 collection" (transclusion) (← links)
- Versatile and infectious: Win64/Expiro is a cross-platform file infector (transclusion) (← links)
- First widespread virus cross-infection (transclusion) (← links)
- File infector Expiro hits US, steals FTP credentials (transclusion) (← links)
- Secrets of the Comfoo masters (transclusion) (← links)
- Learning stateful models for network honeypots (transclusion) (← links)
- Nymaim - obfuscation chronicles (transclusion) (← links)
- Survey on network-based botnet detection methods (transclusion) (← links)
- Win32/64:Napolar: New trojan shines on the cyber crime-scene (transclusion) (← links)
- Qadars: un nouveau malware bancaire avec un composant mobile (transclusion) (← links)
- Mariposa botnet 'mastermind' jailed in Slovenia (transclusion) (← links)
- New CryptoLocker spreads via removable drives (transclusion) (← links)
- Have we seen the end of the ZeroAccess botnet? (transclusion) (← links)
- PlugX: some uncovered points (transclusion) (← links)
- The resurrection of RedKit (transclusion) (← links)
- Analysis of a VBScript bot (transclusion) (← links)
- Worm:VBS/Jenxcus (transclusion) (← links)
- MSIE 0-day exploit CVE-2014-0322 - Possibly targeting French aerospace association (transclusion) (← links)
- Operation SnowMan: DeputyDog actor compromises US veterans of foreign wars website (transclusion) (← links)
- And real name of Magnitude is.... (transclusion) (← links)
- Bitcrypt broken (transclusion) (← links)
- Android RATs branch out with Dendroid (transclusion) (← links)
- Win32/Sality newest component: a router’s primary DNS changer named Win32/RBrute (transclusion) (← links)
- F-Secure has discovered MiniDuke malware samples in the wild (transclusion) (← links)
- Targeted attacks and Ukraine (transclusion) (← links)
- Andromeda 2.7 features (transclusion) (← links)
- “Nemanja” botnet identified by IntelCrawler – Over a thousand point-of-sales, grocery management and accounting systems are compromised all over the world (transclusion) (← links)
- ESET analyzes first Android file-encrypting, TOR-enabled ransomware (transclusion) (← links)
- TR-24 analysis - Destory RAT family (transclusion) (← links)
- RIG exploit kit strikes oil (transclusion) (← links)
- Illuminating the Etumbot APT backdoor (transclusion) (← links)
- Critroni crypto ransomware seen using Tor for command and control (transclusion) (← links)
- Pushdo botnet gets DGA update, over 6,000 machines host new variant (transclusion) (← links)
- New crypto-ransomware emerge in the wild (transclusion) (← links)
- New PoS malware “Backoff” targets US (transclusion) (← links)
- CVE-2013-5330 (Flash) in an unknown Exploit Kit fed by high rank websites (transclusion) (← links)
- Malware analysis of the Lurk downloader (transclusion) (← links)
- The Epic Turla operation (transclusion) (← links)
- Uroburos: the snake rootkit (transclusion) (← links)
- IcoScript: using webmail to control malware (transclusion) (← links)
- ZeroLocker won't come to your rescue (transclusion) (← links)
- Kelihos botnet trying to expand by harnessing Russian national sentiments (transclusion) (← links)
- Symantec/Android.Maistealer (transclusion) (← links)
- Symantec/Backdoor.Arcomrat (transclusion) (← links)
- A ScarePakage variant is targeting more countries : impersonating Europol and AFP (transclusion) (← links)
- "Crypto Ransomware" CTB-Locker (Critroni.A) on the rise (transclusion) (← links)
- Another family of DDoS bots: Avzhan (transclusion) (← links)
- Zorenium bot not half the threat it claims to be (transclusion) (← links)
- Symantec/W32.Zorenium (transclusion) (← links)
- Stealthy peer-to-peer C&C over SMB pipes (transclusion) (← links)
- NetTraveler APT gets a makeover for 10th birthday (transclusion) (← links)
- "NetTraveler is Running!" - Red Star APT attacks compromise high-profile victims (transclusion) (← links)
- NetTraveler is back: the 'Red Star' APT returns with new tricks (transclusion) (← links)
- Hiding in plain sight: the FAKEM remote access trojan (transclusion) (← links)
- Pitou, The “silent” resurrection of the PITOU notorious Srizbi kernel spambot (transclusion) (← links)
- Banking trojan Dridex uses macros for infection (transclusion) (← links)
- Angler Exploit Kit – Operating at the Cutting Edge (transclusion) (← links)
- Le dropper de CTB-Locker (transclusion) (← links)
- Equation: the Death Star of malware galaxy (transclusion) (← links)
- Measuring and detecting malware downloads in live network traffic (transclusion) (← links)
- TorrentLocker ransomware uses email authentication to refine spam runs (transclusion) (← links)
- Threat spotlight: Angler lurking in the domain shadows (transclusion) (← links)
- Carbanak: Multi-million dollar cybercrime gang focuses on banks rather than their customers (transclusion) (← links)
- NjRAT & H-Worm variant infections continue to rise (transclusion) (← links)
- Harnig is back (transclusion) (← links)
- Harnig botnet: a retreating army (transclusion) (← links)
- NitlovePOS: another new POS malware (transclusion) (← links)
- LogPOS - new point of sale malware using mailslots (transclusion) (← links)
- New POS malware emerges - Punkey (transclusion) (← links)
- NewPosThings has new PoS things (transclusion) (← links)
- One-man PoS malware operation captures 22,000 credit card details in Brazil (transclusion) (← links)
- New point-of-sale malware distributed by Andromeda botnet (transclusion) (← links)
- New GamaPoS malware piggybacks on Andromeda botnet; spreads in 13 US states (transclusion) (← links)
- Trend Micro discovers MalumPoS; malware targeting hotels and other US industries (transclusion) (← links)
- PoS RAM scraper malware; past, present and future (transclusion) (← links)
- Alina: casting a shadow on POS (transclusion) (← links)
- Alina: following the shadow part 1 (transclusion) (← links)
- Alina: following the shadow part 2 (transclusion) (← links)
- Combatting point-of-sale malware (transclusion) (← links)
- Gamarue dropping Lethic bot (transclusion) (← links)
- The Andromeda/Gamarue botnet is on the rise again (transclusion) (← links)
- Sony/Destover: mystery North Korean actor’s destructive and past network activity (transclusion) (← links)
- Lights Out: Dragonfly is on the move (transclusion) (← links)
- Dragonfly Threat Against Western Energy Suppliers (transclusion) (← links)
- Meet "Red Dot exploit toolkit" (transclusion) (← links)
- SPL exploit kit – now with CVE-2013-0422 (transclusion) (← links)
- CVE-2013-2465/CVE-2013-2471/CVE-2013-2463 integrating Exploit Kits -- jre7u21 CVE- jre6u45 and earlier (transclusion) (← links)
- Blackhole and Cool Exploit kits nearly extinct (transclusion) (← links)
- Internet Census 2012, port scanning /0 using insecure embedded devices (transclusion) (← links)
- An internet census taken by an illegal botnet – A qualitative assessment of published measurements (transclusion) (← links)
- "njRAT" Uncovered (transclusion) (← links)
- Avalanche phishers migrate to ZeuS (transclusion) (← links)
- Avatar rootkit: the continuing saga (transclusion) (← links)
- Morto worm sets a (DNS) record (transclusion) (← links)
- Stolen passwords allowed hackers to steal over one billion rubles (transclusion) (← links)
- The Miner botnet: Bitcoin mining goes peer-to-peer (transclusion) (← links)
- Cimbot - A technical analysis (transclusion) (← links)
- An overview of messaging botnets (transclusion) (← links)
- OSX/Flashback - The first malware to infect hundreds of thousands of Apple Mac (transclusion) (← links)
- Spambot evolution 2011 (transclusion) (← links)
- A peek inside the PickPocket botnet (transclusion) (← links)
- Win32/Vundo (transclusion) (← links)
- The world's biggest botnets (transclusion) (← links)
- SDBot IRC botnet continues to make waves (transclusion) (← links)
- Microsoft partners with Interpol, industry to disrupt global malware attack affecting more than 770,000 PCs in past six months (transclusion) (← links)
- Tequila botnet leads to phishing attack (transclusion) (← links)
- The Waledac protocol: the how and why (transclusion) (← links)
- Skunkx DDoS bot analysis (transclusion) (← links)
- Trojan.Whitewell: what’s your (bot) Facebook status today? (transclusion) (← links)
- Backdoor uses Evernote as command and control server (transclusion) (← links)
- Covert channels over social networks (transclusion) (← links)
- Google Groups trojan (transclusion) (← links)
- Your files are encrypted with a “Windows 10 Upgrade” (transclusion) (← links)
- Twitter + Pastebin = malware update (transclusion) (← links)
- Walking through Win32/Jabberbot.A instant messaging C&C (transclusion) (← links)
- Botnet command server hidden in Tor (transclusion) (← links)
- Skynet, a Tor-powered botnet straight from Reddit (transclusion) (← links)
- Infamous Skynet botnet author allegedly arrested (transclusion) (← links)
- PoisonIvy adapts to communicate through authentication proxies (transclusion) (← links)
- Dridex learns new trick: P2P over HTTP (transclusion) (← links)
- Chasing cybercrime: network insights of Dyre and Dridex trojan bankers (transclusion) (← links)
- Stealing money from ATMs with malware (transclusion) (← links)
- W32.Stuxnet dossier (transclusion) (← links)
- Fast look at Sundown EK (transclusion) (← links)
- Poisoned search results: How hackers have automated search engine poisoning attacks to distribute malware (transclusion) (← links)
- Traffic direction systems as malware distribution tools (transclusion) (← links)
- Newly launched ‘HTTP-based botnet setup as a service’ empowers novice cybercriminals with bulletproof hosting capabilities (transclusion) (← links)
- An analysis of underground forums (transclusion) (← links)
- Virus scanners for virus authors, part II (transclusion) (← links)
- The good , the bad and the unknown online scanners (transclusion) (← links)
- The IMDDOS botnet: discovery and analysis (transclusion) (← links)
- Virus scanners for virus authors (transclusion) (← links)
- Russian service online to check the detection of malware (transclusion) (← links)
- Why forums? An empirical analysis into the facilitating factors of carding forums (transclusion) (← links)
- MSRT April 2014 – Ramdo (transclusion) (← links)
- Buh-bye Beebone! Law enforcement kills polymorphic virus-spreading botnet (transclusion) (← links)
- A Foray into Conficker’s Logic and Rendezvous Points (transclusion) (← links)
- Hammertoss: stealthy tactics define a Russian cyber threat group (transclusion) (← links)
- Ransomware report: the rise of BandarChor (transclusion) (← links)
- Poison Ivy: assessing damage and extracting intelligence (transclusion) (← links)
- The DGA of Symmi (transclusion) (← links)
- Department of Labor strategic web compromise (transclusion) (← links)
- Case study of the Miner botnet (transclusion) (← links)
- Inside an APT campaign with multiple targets in India and Japan (transclusion) (← links)
- Five charged in largest hacking scheme ever prosecuted in US (transclusion) (← links)
- Hesperbot – A new, advanced banking trojan in the wild (transclusion) (← links)
- Carberp-based trojan attacking SAP (transclusion) (← links)
- Carbanak/Anunak in the BlueCoat malware analysis appliance (transclusion) (← links)
- Anunak:APT against financial institutions (transclusion) (← links)
- Tilon/SpyEye2 intelligence report (transclusion) (← links)
- One Sinowal trojan + one gang = hundreds of thousands of compromised accountS (transclusion) (← links)
- Tatanga: a new banking trojan with MitB functions (transclusion) (← links)
- Massive Drop in number of active Zeus C&C servers (transclusion) (← links)
- Citadel trojan malware analysis (transclusion) (← links)
- The evolution of webinjects (transclusion) (← links)
- The Target breach by the numbers (transclusion) (← links)
- Kaptoxa point-of-sale compromise (transclusion) (← links)
- FighterPOS: a new one-man PoS malware campaign (transclusion) (← links)
- Post-mortem of a zombie: Conficker cleanup after six years (transclusion) (← links)
- Analysis of DarkMegi aka NpcDark (transclusion) (← links)
- Hébergeurs malhonnêtes : nouvelle fermeture (3FN) (transclusion) (← links)
- Conficker working group: lessons learned (transclusion) (← links)
- Watch out for CoreBot, new stealer in the wild (transclusion) (← links)
- An overnight sensation — CoreBot returns as a full-fledged financial malware (transclusion) (← links)
- CTB-Locker is back: the web server edition (transclusion) (← links)
- MediaWiki:Common.js (transclusion) (← links)
- PlugX malware: A good hacker is an apologetic hacker (transclusion) (← links)
- First step in cross-platform Trojan bankers from Brazil done (transclusion) (← links)
- Attack on Zygote: a new twist in the evolution of mobile threats (transclusion) (← links)
- Microsoft security updates January 2016 (transclusion) (← links)
- Social networks – A bonanza for cybercriminals (transclusion) (← links)
- Tis the season for shipping and phishing (transclusion) (← links)
- You can’t be invulnerable, but you can be well protected (transclusion) (← links)
- Kaspersky security bulletin 2015. Overall statistics for 2015 (transclusion) (← links)
- Trojan ChePro, the CPL storm (transclusion) (← links)
- Android Marcher now marching via porn sites (transclusion) (← links)
- Trojan downloaders on the rise: don’t let Locky or TeslaCrypt ruin your day (transclusion) (← links)
- The graphic design of "Maktub Locker" ransomware (transclusion) (← links)
- PETYA crypto-ransomware overwrites MBR to lock users out of their computers (transclusion) (← links)
- Petya ransomware skips the files and encrypts your hard drive instead (transclusion) (← links)
- TreasureHunt: a custom POS malware tool (transclusion) (← links)
- Three month FrameworkPOS malware campaign nabs ~43,000 credit cards from point of sale systems (transclusion) (← links)
- CryptXXX: new ransomware from the actors behind Reveton, dropping via Angler (transclusion) (← links)
- New crypto-ransomware JIGSAW plays nasty games (transclusion) (← links)
- AbaddonPOS: A new point of sale threat linked to Vawtrak (transclusion) (← links)
- Source Code for IoT Botnet ‘Mirai’ Released (transclusion) (← links)
- MMD-0056-2016 - Linux/Mirai, how an old ELF malcode is recycled (transclusion) (← links)
- Hackers are increasingly targeting IoT Devices with Mirai DDoS Malware (transclusion) (← links)
- Updated Sundown Exploit Kit Uses Steganography (transclusion) (← links)
- Zeus variant Floki bot targets PoS data (transclusion) (← links)
- ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar (transclusion) (← links)
- Cerber Dominates Ransomware Landscape After Locky's Demise (transclusion) (← links)
- Where Are They Today? Cybercrime Trojans That No One Misses: Shifu Malware (transclusion) (← links)
- Locky Ransomware switches to the Lukitus extension for Encrypted Files (transclusion) (← links)
- TinyNuke may be a ticking time bomb (transclusion) (← links)
- SamSam Ransomware Evolves Its Tactics Towards Targeting Whole Companies (transclusion) (← links)
- SamSam ransomware designed to inundate targeted networks with thousands of copies of itself (transclusion) (← links)
- GandCrab ransomware distributed by RIG and GrandSoft exploit kits (transclusion) (← links)
- Ransomware or Wiper? LockerGoga Straddles the Line (transclusion) (← links)
- Ransomware : la sulfureuse hypothèse sur la situation chez Norsk Hydro (transclusion) (← links)
- How Lockergoga took down Hydro — ransomware used in targeted attacks aimed at big business (transclusion) (← links)
- Dharma Ransomware Uses AV Tool to Distract from Malicious Activities (transclusion) (← links)
- Live Coronavirus Map Used to Spread Malware (transclusion) (← links)
- REvil ransomware gang's web sites mysteriously shut down (transclusion) (← links)