Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2011-07-06Kaspersky LabsVyacheslav Zakorzhevsky
Cybercriminals switch from MBR to NTFS
Rovnix
2011-07-04Kernelmode.info Forumsrkhunter
WinNT/Rovnix (alias Mayachok, Cidox, BkLoader)
Rovnix
2011-07-01SymantecNicolas Falliere
Sality: Story of a Peerto-Peer Viral Network
Sality
2011-06-29SymantecJohn McDonald
Inside a Back Door Attack
Ghost RAT Dust Storm
2011-06-29SymantecJohn McDonald
Inside a Back Door Attack
Dust Storm
2011-06-22Doctor WebDoctor Web
Criminals gain control over Mac with BackDoor.Olyx
Olyx
2011-06-03CERT Polska / NASKCERT.PL
Botnet Hamweq - analiza
Hamweq
2011-05-25Contagio DumpMila Parkour
W32.Qakbot aka W32/Pinkslipbot or infostealer worm
QakBot
2011-04-30evild3ad blogevild3ad
BKA-Trojaner (Ransomware)
BKA Trojaner
2011-04-28Gentil Kiwi
Un observateur d’événements aveugle…
MimiKatz
2011-04-26Brian Krebs
SpyEye Targets Opera, Google Chrome Users
SpyEye
2011-03-28KrebsOnSecurityBrian Krebs
Microsoft Hunting Rustock Controllers
Rustock
2011-03-11SymantecShunichi Imano
Trojan.Koredos Comes with an Unwelcomed Surprise
Lazarus Group
2011-03-11SymantecShunichi Imano
Trojan.Koredos Comes with an Unwelcomed Surprise
Lazarus Group
2011-03-02ESET ResearchDavid Harley
TDL4 and Glupteba: Piggyback PiggyBugs
Glupteba
2011-02-24Contagiodump BlogMila Parkour
ZeroAccess / Max++ / Smiscer Crimeware Rootkit sample for Step-by-Step Reverse Engineering by Giuseppe Bonfa - << (Update 2011 version available)
ZeroAccess
2011-02-10McAfeeMcAfee Foundstone Professional Services, McAfee Labs
Global Energy Cyberattacks: “Night Dragon”
Night Dragon
2011-01-30Steven K
GpCode Ransomware 2010 Simple Analysis
GPCode
2011-01-20antivirnews
Beschreibung des Virus Backdoor.Win32. Buterat.afj
Buterat
2011-01-09Contagio DumpMila Parkour
Jan 6 CVE-2010-3333 DOC with info theft trojan from the American Chamber of Commerce
playwork