Home
Tools
Malybuzz
peepdf
Pub
Advisories
Exploits
Articles
Presentations
Var
Scripts
About
Home
»
Feed aggregator
»
Sources
ThreatExpert Blog
Research and discoveries from the experts at ThreatExpertUnknownnoreply@blogger.comBlogger65125
URL:
http://blog.threatexpert.com/2008/12/how-to-defeat-koobface.html
Updated:
17 min 58 sec ago
Search this site:
Feodo
peepdf
Malware
Specifications
Black Hat
Analysis
Python
Vulnerabilities
Tools
Exploits
ZeuS
Javascript
Exploit kits
Spam
Conferences
Challenge
Shellcode
Mobile
Security
Tatanga
Research
PDF
Botnets
Scripts
NFC
Reversing
Social Networking
Citadel
Fraud
Botnet
more tags
Latest blog posts
Dridex spam campaign using PDF as infection vector
Adding a scoring system in peepdf
Travelling to the far side of Andromeda at Botconf 2015
Black Hat Arsenal peepdf challenge solution
Black Hat Arsenal peepdf challenge
peepdf news: GitHub, Google Summer of Code and Black Hat
Andromeda/Gamarue bot loves JSON too (new versions details)
Quick analysis of the CVE-2013-2729 obfuscated exploits
Dissecting SmokeLoader (or Yulia's sweet ass proposition)
Released peepdf v0.3
more
Security Posts
Infocon: green
El uso de LLMs como Copilot en la Seguridad Ofensiva (y el Cibercrimen) para hacer malware
ISC Stormcast For Thursday, April 18th, 2024 https://isc.sans.edu/podcastdetail/8944, (Thu, Apr 18th)
A Vuln is a Vuln, unless the CVE for it is after Feb 12, 2024, (Wed, Apr 17th)
A Look at CVE-2024-3400 Activity and Upstyle Backdoor Technical Analysis
Kremlin-backed actors spread disinformation ahead of US elections
Big Tech Says Spy Bill Turns Its Workers Into Informants
Broadcom says “many” VMware perpetual licenses got support extensions
Malvertising campaign targeting IT teams with MadMxShell
OfflRouter virus causes Ukrainian users to upload confidential documents to VirusTotal
Introduction to Software Composition Analysis and How to Select an SCA Tool
Hackers Linked to Russia’s Military Claim Credit for Sabotaging US Water Utilities
5 reasons to strive for better disclosure processes
Overview of Content Published in March
3 healthcare organizations that are building cyber resilience
5 ways to strengthen healthcare cybersecurity
Android Malware Vultur Expands Its Wingspan
Cybersecurity Concerns for Ancillary Strength Control Subsystems
Update on Naked Security
more