| 2013-01-21 | “Red October”. Detailed Malware Description 1. First Stage of Atta | 路人甲 | 3089 | |
| 2013-01-18 | Red October - Java Exploit Delivery Vector Analysis | 路人甲 | 2755 | |
| 2013-01-11 | Red Kit an Emerging Exploit Pack | 路人甲 | 3514 | |
| 2013-01-08 | Skynet, a Tor-powered botnet straight from Reddit | 路人甲 | 3884 | |
| 2013-01-07 | Dissecting a CVE-2012-4792 Payload | 路人甲 | 2668 | |
| 2013-01-06 | Poor mans IPMI | 路人甲 | 2902 | |
| 2013-01-06 | What threats will Web users face in 2013 | 路人甲 | 3038 | |
| 2013-01-06 | How effective is your antivirus product | 路人甲 | 3191 | |
| 2013-01-06 | 2013 Forecast: Malware, scams, security and privacy concerns | 路人甲 | 2914 | |
| 2013-01-06 | THA Deep Dive: Analyzing Malware in Memory | 路人甲 | 2581 | |
| 2013-01-06 | Stabuniq Financial Infostealer Trojan Analysis | 路人甲 | 2809 | |
| 2013-01-05 | dissecting IE 0day attack’s shellcode and xsainfo.jpg | 路人甲 | 2712 | |
| 2013-01-05 | Elderwood Project Behind Latest Internet Explorer Zero-Day Vulnerabili | 路人甲 | 2620 | |