| 2015-10-22 | Internal Threat Intelligence – What Hunters Do | ourren | 2401 | |
| 2015-10-21 | Multi-stage exploit installing trojan | ourren | 2667 | |
| 2015-10-18 | Intelligence-Driven Risk Analysis | ourren | 1787 | |
| 2015-10-18 | New Javascript Deobfuscator Tool | ourren | 2032 | |
| 2015-10-16 | Mapping FinFisher's Continuing Proliferation | ourren | 2585 | |
| 2015-10-13 | The rise of .NET and powershell malware | ourren | 2767 | |
| 2015-10-12 | A close look at an operating botnet | ourren | 2237 | |
| 2015-10-10 | ODA - onlinedisassembler | Bincker | 2686 | |
| 2015-10-10 | Writing Cisco IOS Rootkits | Bincker | 2670 | |
| 2015-10-10 | A Study in Bots: DiamondFox | ourren | 2403 | |
| 2015-10-09 | Duqu 2.0 Win32k Exploit Analysis | tolive | 2991 | |
| 2015-10-09 | Viper is a binary management and analysis framework | ourren | 2001 | |
| 2015-10-08 | Kemoge: Another Mobile Malicious Adware Infecting Over 20 Countries | ourren | 3149 | |