Security Response

Our security research centers around the world provide unparalleled analysis of and protection from IT security threats that include malware, security risks, vulnerabilities, and spam.

Threats

Accurate and up-to-date information on the latest threats. A Threat is an application with the potential to cause harm to a system in the form of destruction, disclosure, data modification, and/or Denial of Service (DoS).
Subscribe
SeverityNameTypeProtected*
Exp.CVE-2015-1681Trojan05/28/2015
Exp.CVE-2015-1685Trojan05/29/2015
Exp.CVE-2015-1686Trojan05/29/2015
Exp.CVE-2015-1689Trojan05/29/2015
Exp.CVE-2015-1705Trojan05/29/2015
Infostealer.Rawpos!g2Trojan05/29/2015
Exp.CVE-2015-1710Trojan05/29/2015
Exp.CVE-2015-1708Trojan05/29/2015
Exp.CVE-2015-1718Trojan05/29/2015
Exp.CVE-2015-1691Trojan05/29/2015
Exp.CVE-2015-1711Trojan05/29/2015
Trojan.Cryptolocker.UTrojan05/28/2015
Linux.MooseTrojan, Worm05/28/2015
Trojan.Cidox!gen5Trojan05/27/2015
Trojan.FitobruteTrojan05/27/2015
Backdoor.WaketagatTrojan05/26/2015
SONAR.Infostealer!g6Trojan, Worm05/26/2015
SONAR.PUA!gen405/26/2015
SONAR.ProcHijack!gen6Trojan05/26/2015
SONAR.SuspBeh!gen330Trojan, Virus, Worm05/26/2015
SONAR.SuspBeh!gen412Trojan, Virus, Worm05/26/2015
SONAR.SuspBeh!gen575Trojan, Virus, Worm05/26/2015
SONAR.SuspBeh!gen582Trojan, Virus, Worm05/26/2015
Trojan.NitovelTrojan05/25/2015
Trojan.SnikyproxTrojan05/23/2015
Backdoor.Weevil!gen1Trojan05/22/2015
Trojan.PollcryptoTrojan05/20/2015
Backdoor.WespionTrojan05/20/2015
Backdoor.NoeskianTrojan05/20/2015
Downloader.Escelar!g1Trojan05/20/2015
Infostealer.Bancos!g1Trojan05/20/2015
Infostealer.StimalerTrojan05/18/2015
Trojan.EmulovTrojan05/18/2015
W97M.Downloader!gen1Trojan05/18/2015
OSX.Genieo!gen105/18/2015
Downloader.Upatre!g15Trojan05/16/2015
Downloader.PicprootTrojan05/16/2015
Trojan.YahamamTrojan05/16/2015
Android.BecuroTrojan05/13/2015
W32.IRCBot!gen4Worm05/13/2015
Backdoor.Tinybaron!g2Trojan05/13/2015
Infostealer.EscelarTrojan05/12/2015
Downloader.EscelarTrojan05/12/2015
W32.DromentsTrojan, Worm05/12/2015
Trojan.CompfunTrojan05/11/2015
Android.DengaruTrojan05/11/2015
W32.BrambulWorm05/11/2015
SONAR.Cryptolocker!g7Trojan, Virus, Worm05/11/2015
SONAR.SuspBeh!gen21Trojan, Virus, Worm05/11/2015
SONAR.SuspBeh!gen308Trojan, Virus, Worm05/11/2015
SONAR.SuspBeh!gen329Trojan, Virus, Worm05/11/2015
SONAR.SuspBeh!gen476Trojan, Virus, Worm05/11/2015
SONAR.SuspBeh!gen572Trojan, Virus, Worm05/11/2015
SONAR.SuspBeh!gen604Trojan, Virus, Worm05/11/2015
SONAR.SuspBeh!gen580Trojan, Virus, Worm05/11/2015
SONAR.SuspBeh!gen605Trojan, Virus, Worm05/11/2015
Downloader.Upatre!g14Trojan05/11/2015
Downloader.BouncedocTrojan05/09/2015
Infostealer.Retga.A!gmTrojan05/09/2015
W32.Cridex!gen4Worm05/08/2015
Trojan.Cryptolocker.STrojan05/07/2015
Linux.MumblehardTrojan05/07/2015
Packed.Generic.488Trojan05/06/2015
Backdoor.Tinybaron!g1Trojan05/06/2015
Packed.Dromedan!gen11Trojan05/06/2015
Exp.CVE-2015-3043Trojan05/06/2015
Infostealer.Retgate.ATrojan05/05/2015
Trojan.Cryptlock.N!gmTrojan05/01/2015
Trojan.WerdlodTrojan05/01/2015
Downloader.Upatre!gen12Trojan04/30/2015
*For continued protection, make sure that your Symantec subscription and/or license are up to date.

Threat Intelligence

Subscribe
Follow the Threat Intelligence Twitter feed
STAR Antimalware Protection Technologies
Internet Security Threat Report, Vol 20