Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- 1940 IPs for a BHEK/ULocker server - Nexcess-Net +
- A DDoS family affair: Dirt Jumper bot family continues to evolve +
- A chat with NGR Bot +
- A new iteration of the TDSS/TDL-4 malware using DGA-based command and control +
- A peek inside the Darkness (Optima) DDoS Bot +
- A peek inside the PickPocket botnet +
- A quick update on spambot Kelihos +
- A study on botnet detection techniques +
- Acquisition and analysis of volatile memory from Android devices +
- Actually, my name is Duqu - Stuxnet is my middle name +
- An analysis of Dorkbot’s infection vectors (part 2) +
- An analysis of the cross-platform backdoor NetWeirdRC +
- An interesting case of JRE sandbox breach (CVE-2012-0507) +
- An overview of exploit packs +
- Analyse de Xtreme RAT +
- Analyse et poncage du botnet HerpesNet +
- Analyse statique de Duqu stage 1 +
- Analyse statique de Duqu stage 2 +
- Analysis of DarkMegi aka NpcDark +
- Analysis of TDL4 +
- Analysis of Ysreef (a variant of Tobfy) +
- Analysis of a “/0” stealth scan from a botnet +
- Analysis of functions used to encode strings in Flame (GDB script) +
- Analysis of the Finfisher lawful interception malware +
- Analyzing a new exploit pack +
- Anaru malware now live and ready to steal +
- Android malware pairs man-in-the-middle with remote-controlled banking trojan +
- Android trojan used to create simple SMS spam botnet +
- Android.Bmaster: A million-dollar mobile botnet +
- Android.Counterclank found in official Android market +
- Anonymous supporters tricked into installing ZeuS trojan +
- Análisis del comportamiento de VOlk y sus funcionalidades +
- Apple releases Java update; includes fix for vulnerability exploited by Flashback malware +
- Apple zombie malware 'NetWeird' rummages for browser and email passwords +
- Armenian Bredolab creator jailed for computer sabotage +
- Attackers place Command and Control servers inside enterprise walls +
- AutoIT ransomware +
- Back to Stuxnet: the missing link +
- Behind the Captcha or Inside Blackhole Exploit Kit 2.0 - Exploit Kit Administration Panel +
- Blackhole & Cridex: season 2 episode 1: Intuit spam & SSL traffic analysis +
- Blackhole Ramnit - samples and analysis +
- Blackhole exploit kit v2 on the rise +
- Blackhole, CVE-2012-0507 and Carberp +
- Bot shopping with my wife +
- BotGrep: finding P2P bots with structured graph analysis +
- BoteAR: a “social botnet”- What are we talking about +
- Botnet command server hidden in Tor +
- Botnet shutdown success story - again: disabling the new Hlux/Kelihos botnet +
- Boxer SMS trojan: malware as a global service +
- Bredolab botmaster ‘Birdie’ still at large +