Category:Publications
Jump to navigation
Jump to search
(previous page) (next page)
This category uses the form Publication.
Pages in category "Publications"
The following 200 pages are in this category, out of 789 total.
(previous page) (next page)"
A
- A case study on Storm worm
- A chat with NGR Bot
- A DDoS family affair: Dirt Jumper bot family continues to evolve
- A Foray into Conficker’s Logic and Rendezvous Points
- A new iteration of the TDSS/TDL-4 malware using DGA-based command and control
- A peek inside the Darkness (Optima) DDoS Bot
- A peek inside the PickPocket botnet
- A quick update on spambot Kelihos
- A ScarePakage variant is targeting more countries : impersonating Europol and AFP
- A study of the Ilomo / Clampi botnet
- A study on botnet detection techniques
- AbaddonPOS: A new point of sale threat linked to Vawtrak
- Acquisition and analysis of volatile memory from Android devices
- Actually, my name is Duqu - Stuxnet is my middle name
- Adobe Flash Player 0-day and HackingTeam's Remote Control System
- Adrenalin botnet. The trend marks the Russian crimeware
- Advancing the fight against botnets with consumer notifications
- Aldi Bot - bka.de DDoS
- Alina: casting a shadow on POS
- Alina: following the shadow part 1
- Alina: following the shadow part 2
- All-in-one malware: an overview of Sality
- An advanced hybrid peer-to-peer botnet
- An analysis of Dorkbot’s infection vectors (part 2)
- An analysis of the cross-platform backdoor NetWeirdRC
- An Analysis of the iKeeB (duh) iPhone botnet (Worm)
- An analysis of underground forums
- An encounter with trojan Nap
- An evaluation of current and future botnet defences
- An interesting case of JRE sandbox breach (CVE-2012-0507)
- An internet census taken by an illegal botnet – A qualitative assessment of published measurements
- An overnight sensation — CoreBot returns as a full-fledged financial malware
- An overview of exploit packs
- An overview of messaging botnets
- Analyse de Xtreme RAT
- Analyse et poncage du botnet HerpesNet
- Analyse of the sample cdorked.A
- Analyse statique de Duqu stage 1
- Analyse statique de Duqu stage 2
- Analysis of a PlugX malware variant used for targeted attacks
- Analysis of a stage 3 Miniduke malware sample
- Analysis of a VBScript bot
- Analysis of a “/0” stealth scan from a botnet
- Analysis of DarkMegi aka NpcDark
- Analysis of functions used to encode strings in Flame (GDB script)
- Analysis of ngrBot
- Analysis of TDL4
- Analysis of the Finfisher lawful interception malware
- Analysis of the malware of Red October - Part 1
- Analysis of the malware of Red October - Part 2
- Analysis of Ysreef (a variant of Tobfy)
- Analysis: Malware Win32/Rimecud.B
- Analyzing a new exploit pack
- Anaru malware now live and ready to steal
- And real name of Magnitude is....
- Android malware pairs man-in-the-middle with remote-controlled banking trojan
- Android Marcher now marching via porn sites
- Android RATs branch out with Dendroid
- Android trojan used to create simple SMS spam botnet
- Android.Bmaster: A million-dollar mobile botnet
- Android.Counterclank found in official Android market
- Andromeda 2.7 features
- Angler Exploit Kit – Operating at the Cutting Edge
- Anonymous supporters tricked into installing ZeuS trojan
- Another family of DDoS bots: Avzhan
- Anunak:APT against financial institutions
- Análisis del comportamiento de VOlk y sus funcionalidades
- Apache binary backdoors on Cpanel-based servers
- Apple releases Java update; includes fix for vulnerability exploited by Flashback malware
- Apple took 3 years to fix Finfisher trojan hole
- Apple zombie malware 'NetWeird' rummages for browser and email passwords
- APT1: technical backstage
- Armenian Bredolab creator jailed for computer sabotage
- Attack on Zygote: a new twist in the evolution of mobile threats
- Attackers place Command and Control servers inside enterprise walls
- Attention! All data on your hardrive is encrypted
- AutoIT ransomware
- Avalanche phishers migrate to ZeuS
- Avatar rootkit: the continuing saga
B
- Back to Stuxnet: the missing link
- Backdoor uses Evernote as command and control server
- Backdoor:Win32/Caphaw.A
- Banking trojan Dridex uses macros for infection
- BareBox: efficient malware analysis on bare-metal
- Battling the Rustock threat
- Battling the Zbot threat
- Behind the Captcha or Inside Blackhole Exploit Kit 2.0 - Exploit Kit Administration Panel
- Bitcrypt broken
- Black Dragon: "... and all will burn beneath the shadow of my wings"
- BlackEnergy competitor – The 'Darkness' DDoS bot
- Blackhole & Cridex: season 2 episode 1: Intuit spam & SSL traffic analysis
- Blackhole and Cool Exploit kits nearly extinct
- Blackhole exploit kit v2 on the rise
- Blackhole Ramnit - samples and analysis
- Blackhole, CVE-2012-0507 and Carberp
- Bleeding Life Exploit Pack
- Bot herders build newer versions of previous botnet Waledac
- Bot of the day: Ramnit/Ninmul
- Bot Roast II nets 8 individuals
- Bot shopping with my wife
- BoteAR: a “social botnet”- What are we talking about
- BotGrep: finding P2P bots with structured graph analysis
- BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection
- Botnet command server hidden in Tor
- Botnet construction, control and concealment
- Botnet operation disabled
- Botnet shutdown success story - again: disabling the new Hlux/Kelihos botnet
- Botnet shutdown success story: how Kaspersky Lab disabled the Hlux/Kelihos botnet
- Botnet: classification, attacks, detection, tracing, and preventive measures
- Botnets on discount!
- Boxer SMS trojan: malware as a global service
- Bredolab botmaster ‘Birdie’ still at large
- Bredolab severely injured but not dead
- Buh-bye Beebone! Law enforcement kills polymorphic virus-spreading botnet
C
- Carbanak/Anunak in the BlueCoat malware analysis appliance
- Carbanak: Multi-million dollar cybercrime gang focuses on banks rather than their customers
- Carberp + BlackHole = growing fraud incidents
- Carberp - a modular information stealing trojan
- Carberp gang evolution: CARO 2012 presentation
- Carberp reverse engineering
- Carberp steals e-cash vouchers from Facebook users
- Carberp, the renaissance ?
- Carberp-based trojan attacking SAP
- Carberp-in-the-Mobile
- Carberp: it’s not over yet
- Carberp: Silent trojan, eventual successor to ZeuS
- Case study of the Miner botnet
- Cerber Dominates Ransomware Landscape After Locky's Demise
- Chameleon botnet grabbed $6m A MONTH from online ad-slingers
- Chapro.A source code
- Chasing cybercrime: network insights of Dyre and Dridex trojan bankers
- China targets macs used by NGOs
- Cimbot - A technical analysis
- Citadel : le fichier de configuration
- Citadel plitfi botnet report
- Citadel trojan malware analysis
- Citadel trojan touts trouble-ticket system
- Citadel V1.3.5.1: enter the fort’s dungeons
- Citadel ZeuS bot
- Citadel: a cyber-criminal’s ultimate weapon?
- Clampi/Ligats/Ilomo trojan
- Collateral damage: Microsoft hits security researchers along with Citadel
- Combatting point-of-sale malware
- MediaWiki:Common.js
- Conficker working group: lessons learned
- Confidential documents from Japanese politics stolen by malware
- Cool EK : "Hello my friend..." CVE-2012-5076
- Cool Exploit Kit - A new Browser Exploit Pack on the Battlefield with a "Duqu" like font drop
- Cool exploit kit - URL structure
- Coordinated DDoS attack during Russian Duma elections
- Coreflood botnet - Detection and remediation
- Covert channels over social networks
- Cracking down on botnets
- Cracking into the new P2P variant of Zeusbot/Spyeye
- Cracking the encrypted C&C protocol of the ZeroAccess botnet
- Crisis for Windows sneaks onto virtual machines
- Critroni crypto ransomware seen using Tor for command and control
- Cross-platform Frutas RAT builder and back door
- Crypto breakthrough shows Flame was designed by world-class scientists
- Crypto experts called on to crack cyberspy tool's encryption
- CryptoDefense and How Decrypt ransomware information guide and FAQ
- CryptXXX: new ransomware from the actors behind Reveton, dropping via Angler
- CTB-Locker is back: the web server edition
- Cutwail drives spike in malicious HTML attachment spam
- CVE-2012-4681 - On its way to Sakura Exploit Kit too
- CVE-2012-4681 - Redkit Exploit Kit - I want Porche Turbo
- CVE-2012-4681 - Связка Sweet Orange
- CVE-2012-5076 - Massively adopted - Blackhole update to 2.0.1
- CVE-2013-1493 (jre17u15 - jre16u41) integrating exploit kits
- CVE-2013-2465/CVE-2013-2471/CVE-2013-2463 integrating Exploit Kits -- jre7u21 CVE- jre6u45 and earlier
- CVE-2013-5330 (Flash) in an unknown Exploit Kit fed by high rank websites
- CVE-2015-0311 (Flash up to 16.0.0.287) integrating Exploit Kits
- Cyber gang seeks botmasters to wage massive wave of trojan attacks against U.S. banks
D
- DaRK DDoSseR leads to Gh0st RAT
- DarkMegi rootkit - sample (distributed via Blackhole)
- Darkmegi: this is not the Rootkit you’re looking for
- Darkness DDoS bot version identification guide
- DDoS attacks: the Zemra bot
- DDoS watch: keeping an eye on Aldi Bot
- De code van Dorifel nader bekeken
- Demystifying Pobelka
- Department of Justice takes action to disable international botnet
- Department of Labor strategic web compromise
- Detecting extended attributes (ZeroAccess) and other Frankenstein’s monsters with HMFT
- Detection and classification of different botnet C&C channels
- DGAs and cyber-criminals: a case study
- Dharma Ransomware Uses AV Tool to Distract from Malicious Activities
- Digging inside Tinba malware - A walkthrough
- Digging into the Nitol DDoS botnet
- Dirt Jumper DDoS bot increasingly popular
- Discerning relationships: the Mexican botnet connection
- DISCLOSURE: detecting botnet command and control servers through large-scale NetFlow analysis
- Discovered: botnet costing display advertisers over six million dollars per month
- Disorderly conduct: localized malware impersonates the police
- Disttrack malware overwrites files, infects MBR