The goal of this project is to make virtual world a safer and better place without child pornography, major computer crime and RIAA.
Login As
You can log in if you are registered at one of these services:
Security Bulletins
Latest Malware Updates

Infostealer.Posteal

02/26/2015

Downloader.Busadom

02/26/2015

Trojan.Ladocosm

02/26/2015

SONAR.SuspDocRun

02/25/2015

SONAR.SuspHelpRun

02/25/2015

News

ZeuS Trojan uses new Upatre loader to replicate

Along with Pony Loader, Upatre loader uses Cutwail botnet to replicate.

10/10/2013

Dell: Cutwail botnet spreads Trojan for Android-devices

Malicious program is downloaded to the systems posing as an update for Adobe Flash Player.

04/09/2013

Grum botnet brought back to life

Researchers found five new C&C servers connected to botnet.

03/27/2013

Carna botnet consists of 420 million IP-addresses

Hacker created botnet in order to demonstrate the map of devices that use IPv4 protocol.

03/20/2013

Researchers: Kelihos returns with more sufficient functions

The new version of the botnet comes with better resistance to sinkholing techniques.

02/12/2013

Symantec and Microsoft Eliminated Russian Bamital Botnet

Using the botnet cybercriminals managed to control hundreds of thousand PCs around the world.

02/08/2013

Grum completely shut down

An international team of infosec professionals shut down all the botnet’s C&Cs.

07/19/2012

Dutch authorities take control over two servers of the Grum botnet

The botnet spread almost 18% of the world’s spam on the Internet and is the third largest after the Cutwail and Lethic.

07/18/2012

Dr. Web: Win32.Rmnet.16 attacks users in UK, Australia and US

Russian antivirus company Dr. Web discovered a botnet created by new variant of Win32.Rmnet.12 malware.

05/15/2012

New Mac threat discovered

The Sabpab Trojan horse allows hackers to upload and download any file.

04/16/2012

Apple tries to unplug an AV’s server

Apple claims that an AV’s server is used as a Falshback C&C.

04/13/2012

Virus Flashback affected 550,000 PCs

Malware was able to infect 550,000 computers based on Mac OS X.

04/09/2012

Microsoft shuts down 2 botnet C&C

Software giant takes legal actions to disrupt ZueS botnets.

03/26/2012

Anonymous hacktivists were infected with ZeuS Trojan

Anonymous participants lost their personal data in the course of conducting DDoS-attacks.

03/06/2012

Zeusbot has leveraged P2P communication

Since the last update each bot in the network is a minimal Web-server, capable of handling HTTP requests and performing C&C functionalities.

02/29/2012

German Police Used Trojan to Tap Skype Calls and IM Chats (Update)

German researchers captured and analyzed a new Trojan horse which they claim might be used by police to tap Skype calls and IM messages.

10/11/2011

SpyEye banking trojan: now with SMS hijacking capability

The SpyEye banking trojan has acquired the ability to reroute one-time passwords sent to victims' cellphones, a measure that bypasses protections more and more financial institutions are adopting.

10/07/2011

ZeuS Source Code Leaked to the Internet

Source code of latest version of the ZeuS crimeware kit has been leaked on the Internet.

05/11/2011

Security Advisories Database

Remote Code Execution Vulnerability in Microsoft OpenType Font Driver

A remote attacker can execute arbitrary code on the target system.

07/21/2015

SQL Injection Vulnerability in Piwigo

SQL inection vulnerability has been discovered in Piwigo.

02/05/2015

Cross-site Scripting Vulnerability in DotNetNuke

A cross-site scripting (XSS) vulnerability has been discovered in DotNetNuke.

02/05/2015

Cross-site Scripting Vulnerability in Hitachi Command Suite

A cross-site scripting vulnerability was found in Hitachi Command Suite.

02/02/2015

Denial of service vulnerability in FreeBSD SCTP RE_CONFIG Chunk Handling

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Apache Traffic Server HTTP TRACE Max-Forwards

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in MalwareBytes Anti-Exploit "mbae.sys"

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Linux Kernel splice

An attacker can perform a denial of service attack.

01/29/2015

Denial of service vulnerability in Python Pillow Module PNG Text Chunks Decompression

An attacker can perform a denial of service attack.

01/20/2015