Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- "Crypto Ransomware" CTB-Locker (Critroni.A) on the rise +
- A ScarePakage variant is targeting more countries : impersonating Europol and AFP +
- An internet census taken by an illegal botnet – A qualitative assessment of published measurements +
- Analysis of a VBScript bot +
- And real name of Magnitude is.... +
- Android RATs branch out with Dendroid +
- Andromeda 2.7 features +
- Anunak:APT against financial institutions +
- Banking trojan Dridex uses macros for infection +
- Bitcrypt broken +
- CVE-2013-5330 (Flash) in an unknown Exploit Kit fed by high rank websites +
- Combatting point-of-sale malware +
- Critroni crypto ransomware seen using Tor for command and control +
- CryptoDefense and How Decrypt ransomware information guide and FAQ +
- Dragonfly Threat Against Western Energy Suppliers +
- Dridex learns new trick: P2P over HTTP +
- Dyre Banking Trojan +
- ESET analyzes first Android file-encrypting, TOR-enabled ransomware +
- F-Secure has discovered MiniDuke malware samples in the wild +
- Have we seen the end of the ZeroAccess botnet? +
- IcoScript: using webmail to control malware +
- Illuminating the Etumbot APT backdoor +
- Kaptoxa point-of-sale compromise +
- Kelihos botnet trying to expand by harnessing Russian national sentiments +
- Lights Out: Dragonfly is on the move +
- MSIE 0-day exploit CVE-2014-0322 - Possibly targeting French aerospace association +
- MSRT April 2014 – Ramdo +
- Malware analysis of the Lurk downloader +
- NetTraveler APT gets a makeover for 10th birthday +
- New PoS malware “Backoff” targets US +
- New crypto-ransomware emerge in the wild +
- Operation SnowMan: DeputyDog actor compromises US veterans of foreign wars website +
- Operation Socialist The Inside Story Of How British Spies Hacked Belgium’s Largest Telco +
- OphionLocker: Joining in the Ransomware Race +
- Pitou, The “silent” resurrection of the PITOU notorious Srizbi kernel spambot +
- PlugX: some uncovered points +
- PoS RAM scraper malware; past, present and future +
- Poison Ivy: assessing damage and extracting intelligence +
- Pushdo botnet gets DGA update, over 6,000 machines host new variant +
- REVETON Ransomware Spreads with Old Tactics, New Infection Method +
- RIG exploit kit strikes oil +
- Sony/Destover: mystery North Korean actor’s destructive and past network activity +
- Symantec/W32.Zorenium +
- TR-24 analysis - Destory RAT family +
- Targeted attacks and Ukraine +
- The 'Penquin' Turla +
- The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements +
- The Epic Turla operation +
- The Target breach by the numbers +
- The evolution of webinjects +