| 2013-01-21 | Unpacking a Malicious Java Applet | 路人甲 | 3021 | |
| 2013-01-21 | “Red October”. Detailed Malware Description 1. First Stage of Atta | 路人甲 | 3072 | |
| 2013-01-18 | Red October - Java Exploit Delivery Vector Analysis | 路人甲 | 2740 | |
| 2013-01-11 | Red Kit an Emerging Exploit Pack | 路人甲 | 3494 | |
| 2013-01-08 | Skynet, a Tor-powered botnet straight from Reddit | 路人甲 | 3867 | |
| 2013-01-07 | Dissecting a CVE-2012-4792 Payload | 路人甲 | 2658 | |
| 2013-01-06 | Poor mans IPMI | 路人甲 | 2892 | |
| 2013-01-06 | What threats will Web users face in 2013 | 路人甲 | 3020 | |
| 2013-01-06 | How effective is your antivirus product | 路人甲 | 3175 | |
| 2013-01-06 | 2013 Forecast: Malware, scams, security and privacy concerns | 路人甲 | 2905 | |
| 2013-01-06 | THA Deep Dive: Analyzing Malware in Memory | 路人甲 | 2573 | |
| 2013-01-06 | Stabuniq Financial Infostealer Trojan Analysis | 路人甲 | 2799 | |
| 2013-01-05 | dissecting IE 0day attack’s shellcode and xsainfo.jpg | 路人甲 | 2699 | |