, AbuseIPDB-IP address abuse reports

, Cloudflare BugCloudbleed May Have Leaked Data From Millions of Sites

, DDoS attacks in Q4 2017-Securelist

, enyelkm-LKM rootkit for Linux x86 with the 2.6 kernel

, Open Threat Exchange

, Open Threat Intelligence

R. Tracker,

. Virussign-malware-research-&-data and . Center, Virus Free Downloads

S. Alam, R. N. Horspool, I. Traore, and I. Sogukpinar, A framework for metamorphic malware analysis and real-time detection, Computers & Security, vol.48, pp.212-233, 2015.

J. Butler and G. Hoglund, VICE-catch the hookers, Black Hat USA, vol.61, pp.17-35, 2004.

S. Chen, C. Guo, X. Yuan, F. Merkle, H. Schaefer et al., Oceans: Online collaborative explorative analysis on network security, Proceedings of the Eleventh Workshop on Visualization for Cyber Security, pp.1-8, 2014.

B. Cogswell and M. Russinovich, Rootkitrevealer v1. 71. Rootkit detection tool by Microsoft, 2006.

A. Damodaran, F. D. Troia, C. A. Visaggio, T. H. Austin, and M. Stamp, A comparison of static, dynamic, and hybrid analysis for malware detection, Journal of Computer Virology and Hacking Techniques, vol.13, issue.1, pp.1-12, 2017.

M. Guri, G. Kedma, T. Sela, B. Carmeli, A. Rosner et al., Noninvasive detection of anti-forensic malware, Malicious and Unwanted Software:" The Americas"(MALWARE), 2013 8th International Conference on, pp.1-10, 2013.

G. Hoglund and J. Butler, Rootkits: subverting the Windows kernel, 2006.

E. Kalita, WannaCry Ransomware Attack: Protect Yourself from WannaCry Ransomware Cyber Risk and Cyber War, 2017.

S. A. Musavi and M. Kharrazi, Back to Static Analysis for Kernel-Level Rootkit Detection, IEEE Transactions on Information Forensics and Security, vol.9, issue.9, pp.1465-1476, 2014.

J. Rutkowska, Detecting windows server compromises with patchfinder 2. Personal Communication, 2004.

P. Szor, The art of computer virus research and defense, 2005.