Hacker News
- Wire Wire: A West African Cyber Threat https://www.secureworks.com/research/wire-wire-a-west-african-cyber-threat 4 comments
- Botnet protects code with hardware-based licensing system http://www.secureworks.com/research/threats/zeus 7 comments
- Inside the "Ron Paul" Spam Botnet http://www.secureworks.com/research/threats/ronpaul/?threat=ronpaul 2 comments
- Threat Group-4127 Targets Hillary Clinton Presidential Campaign https://www.secureworks.com/research/threat-group-4127-targets-hillary-clinton-presidential-campaign 5 comments politics
- Dell, DCEPT, a honeypot tool for detecting network intrusions. https://www.secureworks.com/blog/dcept 4 comments sysadmin
- Skeleton Key malware: resides in-memory on a victim's Active Domain controllers http://www.secureworks.com/cyber-threat-intelligence/threats/skeleton-key-malware-analysis/ 8 comments sysadmin
- BGP Hijacking for Cryptocurrency Profit http://www.secureworks.com/cyber-threat-intelligence/threats/bgp-hijacking-for-cryptocurrency-profit/ 10 comments netsec
- Truman sandbox http://www.secureworks.com/cyber-threat-intelligence/tools/truman/#.uoqw0_grepg.reddit 12 comments netsec
- .Gov Websites Abused in Ongoing Spam Campaign http://www.secureworks.com/cyber-threat-intelligence/blog/spam/government-websites-abused-ongoing-spam-campaign/ 6 comments netsec
- Key observation by Joe Stewart on the CRC-16 algorithm used in the "Operation Aurora" attack http://www.secureworks.com/research/blog/index.php/2010/01/20/operation-aurora-clues-in-the-code/ 4 comments netsec
- Alien Autopsy: Reverse Engineering Win32 Trojans on Linux http://www.secureworks.com/research/articles/alien 3 comments linux
- Inside the 'Ron Paul' Spam Botnet http://www.secureworks.com/research/threats/ronpaul/?threat=ronpaul 33 comments programming