Security Response

Our security research centers around the world provide unparalleled analysis of and protection from IT security threats that include malware, security risks, vulnerabilities, and spam.

Threats

Accurate and up-to-date information on the latest threats. A Threat is an application with the potential to cause harm to a system in the form of destruction, disclosure, data modification, and/or Denial of Service (DoS).
Subscribe
SeverityNameTypeProtected*
Trojan.Ransomlock!g77Trojan10/30/2014
Backdoor.KargatrojTrojan10/30/2014
Android.Lockdroid.ETrojan10/29/2014
Trojan.Cryptlock.F!gmTrojan10/28/2014
Trojan.ToraldropTrojan10/28/2014
Backdoor.Darkmoon!g11Trojan10/28/2014
Exp.CVE-2014-4148Trojan10/29/2014
Backdoor.Emdivi!gen2Trojan10/28/2014
SONAR.SuspBeh!gen130Trojan10/28/2014
SONAR.SuspBeh!gen139Trojan10/28/2014
SONAR.SuspBeh!gen115Trojan10/28/2014
SONAR.SuspBeh!gen230Trojan10/28/2014
SONAR.SuspBeh!gen254Trojan10/28/2014
Backdoor.Emdivi!gen1Trojan10/24/2014
Trojan.SwortTrojan10/24/2014
Infostealer.InjecshotTrojan10/24/2014
Trojan.AlnaddyTrojan10/24/2014
Android.Lockdroid.FTrojan10/23/2014
Bloodhound.Exploit.553Trojan10/23/2014
Bloodhound.Flash.26Trojan10/21/2014
Trojan.PlugdisTrojan10/21/2014
Backdoor.Vinself.CTrojan10/21/2014
Exp.CVE-2014-056510/20/2014
SONAR.LoadPoint!gen5Trojan10/20/2014
SONAR.SuspBeh!gen133Trojan10/20/2014
SONAR.SuspBeh!gen202Trojan10/20/2014
SONAR.SuspBeh!gen126Trojan10/20/2014
SONAR.SuspBeh!gen264Trojan10/20/2014
SONAR.SuspBeh!gen219Trojan10/20/2014
SONAR.SuspBeh!gen108Trojan10/20/2014
SONAR.SuspBeh!gen119Trojan10/20/2014
SONAR.SuspBeh!gen106Trojan10/20/2014
SONAR.SuspBeh!gen275Trojan10/20/2014
SONAR.SuspBeh!gen162Trojan10/20/2014
SONAR.SuspBeh!gen143Trojan10/20/2014
SONAR.SuspBeh!gen191Trojan10/20/2014
OSX.VentirTrojan10/19/2014
Trojan.Cryptdef!gmTrojan10/19/2014
Bloodhound.HWP.5Trojan10/17/2014
W32.Qakbot!gen9Trojan, Virus, Worm10/17/2014
Backdoor.EmdiviTrojan10/17/2014
Trojan.BegintoTrojan10/16/2014
Android.WindseekerTrojan10/15/2014
Exp.CVE-2014-411410/21/2014
Backdoor.GresimTrojan10/14/2014
Backdoor.Hikit!gen1Trojan10/14/2014
Trojan.Naid!gen1Trojan10/14/2014
Trojan.Naid!gm2Trojan10/14/2014
SearchProtect!gen110/09/2014
Yontoo.C!gen110/14/2014
W32.IppedoWorm10/13/2014
Trojan.Cidox.DTrojan10/13/2014
Bloodhound.Malautoit.6Trojan10/13/2014
Downloader.Ponik!gen10Trojan10/13/2014
Android.GomalTrojan10/11/2014
Android.Selfmite.BTrojan, Worm10/10/2014
Trojan.FestalcoTrojan10/09/2014
Trojan.Cryptolocker!g7Trojan10/10/2014
Trojan.DeltatoolbarTrojan10/09/2014
Backdoor.TepmimTrojan10/09/2014
Packed.Generic.468Trojan10/06/2014
Backdoor.CakwerdTrojan10/06/2014
Trojan.Asprox.B!gen1Trojan09/26/2014
Android.HabeyTrojan10/05/2014
Packed.Generic.467Trojan10/15/2014
Trojan.Lethic!gmTrojan10/04/2014
Backdoor.Lancafdo!gmTrojan10/05/2014
OSX.LuadditTrojan10/03/2014
Linux.GafgytTrojan10/02/2014
IOS.FitikserTrojan10/02/2014
Packed.Generic.466Trojan10/02/2014
*For continued protection, make sure that your Symantec subscription and/or license are up to date.

Threat Intelligence

Subscribe
Follow the Threat Intelligence Twitter feed
STAR Antimalware Protection Technologies
2014 Internet Security Threat Report, Vol 19