Search
Keyword: glossary.asp
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
Description Name: HYTOP2006 ASP WebShell - HTTP (Request) .
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It injects its dropped file/component to specific
* indicates a new version of an existing rule Deep Packet Inspection Rules: Database Oracle 1009342 - Oracle Database DIRECTORY Object Information Disclosure Vulnerability (CVE-2005-0298) Suspicious
* indicates a new version of an existing rule Deep Packet Inspection Rules: Database Oracle 1009342* - Oracle Database DIRECTORY Object Information Disclosure Vulnerability (CVE-2005-0298) 1009306* -
This Virus arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It enables its automatic execution at every system
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It gathers target email addresses from the Windows Address
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires being executed with a specific
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Backdoor arrives on a system as a
WORM_UTOTI.KDS connects to this URL to get the IP and geographical location of the infected system.
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/1352011121048.jpeg PE_SALITY and PE_VIRUX are two of the most prevalent file infector families to date. Trend Micro engineers observed an increase in
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/016201151738.jpeg We've recently discovered an attack that highlights the risks involved in accessing personal Webmail accounts at work. It takes
http://sjc1-te-cmsap1.sdi.trendnet.org/dumpImages/206201065435.jpeg How do users get this Web threat? Systems get infected by various binaries once users visit any site injected with a malicious
From: Facebook Advertising Subject: FaceBook message: Girls Dancing on facebook Video (Last rated by {random name}) Message from Your Friends on Faceboo, March 11, 2009 You have 1 Personal Message: