Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- The good , the bad and the unknown online scanners + (Blogpost)
- Got malware? Rent an exploit service + (Blogpost)
- Trojan.Ransomgerpo criminal arrested + (Blogpost)
- NetTraveler is back: the 'Red Star' APT returns with new tricks + (Blogpost)
- Latest Kelihos botnet shut down live at RSA Conference 2013 + (Blogpost)
- Alina: following the shadow part 1 + (Blogpost)
- You can’t be invulnerable, but you can be well protected + (Blogpost)
- Targeted destructive malware explained: Troj/Mdrop-ELD + (Blogpost)
- Virus scanners for virus authors + (Blogpost)
- Reversing Andromeda-Gamarue botnet + (Blogpost)
- New crypto-ransomware emerge in the wild + (Blogpost)
- Kore exploit kit + (Blogpost)
- Analysis of DarkMegi aka NpcDark + (Blogpost)
- Trojan.Whitewell: what’s your (bot) Facebook status today? + (Blogpost)
- NitlovePOS: another new POS malware + (Blogpost)
- Mac spyware found at Oslo Freedom Forum + (Blogpost)
- The life cycle of web server botnet recruitment + (Blogpost)
- PlugX malware: A good hacker is an apologetic hacker + (Blogpost)
- OSX Kitmos analysis + (Blogpost)
- Android Marcher now marching via porn sites + (Blogpost)
- Qadars: un nouveau malware bancaire avec un composant mobile + (Blogpost)
- Carbanak: Multi-million dollar cybercrime gang focuses on banks rather than their customers + (Blogpost)
- Case study of the Miner botnet + (Conference paper or presentation)
- The Waledac protocol: the how and why + (Conference paper or presentation)
- Stealing money from ATMs with malware + (Conference paper or presentation)
- An analysis of underground forums + (Conference paper or presentation)
- The evolution of webinjects + (Conference paper or presentation)
- Post-mortem of a zombie: Conficker cleanup after six years + (Conference paper or presentation)
- A Foray into Conficker’s Logic and Rendezvous Points + (Conference paper or presentation)
- Industrial espionage and targeted attacks: understanding the characteristics of an escalating threat + (Conference paper or presentation)
- 'Tigger' trojan keeps security researchers hopping + (Press article)
- Chameleon botnet grabbed $6m A MONTH from online ad-slingers + (Press article)
- Five charged in largest hacking scheme ever prosecuted in US + (Press article)
- Mariposa botnet 'mastermind' jailed in Slovenia + (Press article)
- Massive search fraud botnet seized by Microsoft and Symantec + (Press article)
- Mastermind behind Gozi bank malware charged along with two others + (Press article)
- Operation Socialist The Inside Story Of How British Spies Hacked Belgium’s Largest Telco + (Press article)
- Pushdo botnet gets DGA update, over 6,000 machines host new variant + (Press article)
- REvil ransomware gang's web sites mysteriously shut down + (Press article)
- Ransomware : la sulfureuse hypothèse sur la situation chez Norsk Hydro + (Press article)
- Stolen passwords allowed hackers to steal over one billion rubles + (Press article)
- Bot Roast II nets 8 individuals + (Press release)
- The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements + (Scientific paper)
- Survey on network-based botnet detection methods + (Scientific paper)
- An internet census taken by an illegal botnet – A qualitative assessment of published measurements + (Scientific paper)
- The underground economy of spam: a botmaster's perspective of coordinating large-scale spam campaigns + (Scientific paper)
- Why forums? An empirical analysis into the facilitating factors of carding forums + (Scientific paper)
- Measuring and detecting malware downloads in live network traffic + (Scientific paper)
- McAfee Labs threat advisory : W32.Pinkslipbot + (Tech report)
- The IMDDOS botnet: discovery and analysis + (Tech report)
- Citadel trojan malware analysis + (Tech report)
- Hesperbot – A new, advanced banking trojan in the wild + (Tech report)
- Anunak:APT against financial institutions + (Tech report)
- FighterPOS: a new one-man PoS malware campaign + (Tech report)
- Traffic direction systems as malware distribution tools + (Tech report)
- Poisoned search results: How hackers have automated search engine poisoning attacks to distribute malware + (Tech report)
- Hammertoss: stealthy tactics define a Russian cyber threat group + (Tech report)
- Tilon/SpyEye2 intelligence report + (Tech report)
- W32.Stuxnet dossier + (Tech report)
- Kaptoxa point-of-sale compromise + (Tech report)
- Inside an APT campaign with multiple targets in India and Japan + (Tech report)