Security Response

Our security research centers around the world provide unparalleled analysis of and protection from IT security threats that include malware, security risks, vulnerabilities, and spam.

Threats

Accurate and up-to-date information on the latest threats. A Threat is an application with the potential to cause harm to a system in the form of destruction, disclosure, data modification, and/or Denial of Service (DoS).
Subscribe
SeverityNameTypeProtected*
W32.Mezit!infTrojan04/17/2014
Trojan.Shylock!gen12Trojan04/17/2014
Infostealer.DandeTrojan04/17/2014
Trojan.Pandex!gen4Trojan04/16/2014
Trojan.Zbot!gen74Trojan04/15/2014
VBS.CrigentTrojan04/15/2014
SONAR.SuspLaunch2Trojan
Backdoor.KihomchiTrojan04/15/2014
SONAR.Sality!gen1Virus, Worm04/14/2014
SONAR.Sality!gen2Virus, Worm04/14/2014
SONAR.SelfHijack!gen1Trojan, Virus, Worm04/14/2014
SONAR.ProcHijack!gen5Trojan04/14/2014
SONAR.SuspBeh!DropTrojan04/14/2014
Trojan.Gatak!gmTrojan04/14/2014
SONAR.Zbot!gen3Trojan04/14/2014
SONAR.RogueAV!gen2304/14/2014
SONAR.RogueAV!gen2204/14/2014
Trojan.Shylock!gen10Trojan04/14/2014
Trojan.Shylock!gen11Trojan04/14/2014
Bloodhound.Exploit.551Trojan
Packed.Generic.460Trojan04/12/2014
Trojan.Shylock!gen9Trojan04/08/2014
Trojan.Gatak!gen4Trojan04/07/2014
Android.VirusshieldTrojan04/08/2014
Backdoor.Necurs!gen5Trojan04/04/2014
Trojan.Asprox.BTrojan04/04/2014
O97M.CrigentTrojan04/03/2014
Yontoo.C04/02/2014
Trojan.FakeAV!gen120Trojan04/03/2014
Trojan.FakeAV!gen119Trojan
Trojan.Ransomlock.AKTrojan04/01/2014
W32.PixiposWorm04/01/2014
Trojan.FakeAV!gmTrojan04/02/2014
Trojan.DenpurTrojan
Backdoor.LokidokTrojan
Android.MalminerTrojan03/27/2014
PUA.Maltrec.TS!g103/26/2014
Trojan.CryptodefenseTrojan03/26/2014
W32.CraqWorm03/25/2014
Trojan.Gampass!gen5Trojan03/26/2014
Bloodhound.Exploit.550Trojan03/25/2014
Trojan.TrensilTrojan03/24/2014
*For continued protection, make sure that your Symantec subscription and/or license are up to date.

Threat Intelligence

Subscribe
Follow the Threat Intelligence Twitter feed
STAR Antimalware Protection Technologies
2014 Internet Security Threat Report, Vol 19