Follow:

Microsoft Volume Licensing Blogtwitter

Microsoft threat reports

Microsoft Malware Protection Center Threat Report—Rootkits

Author: Heather Goudey | Download

Rootkits provide stealth capabilities to malware. This report examines how attackers use rootkits, and how rootkits function on affected computers.

Microsoft Malware Protection Center Threat Report—EyeStye

Authors: Jaime Wong and Shannon Sabens | Download

This report examines the prevalent EyeStye family of malware.

Microsoft Malware Protection Center Threat Report—Poison Ivy

Authors: Tareq Saade, Dan Kurc, and Holly Stewart | Download

This report provides an overview of the Win32/Poison (Poison Ivy) family of malware.

Special Edition Security Intelligence Report: Battling the Rustock Threat

Authors: David Anselmi, Richard Boscovich, T.J. Campana, Samantha Doerr, Marc Lauricella, Oleg Petrovsky, Tareq Saade, Holly Stewart | Download: PDF format | XPS format

This special edition of the SIR provides an overview of the Win32/Rustock family of rootkit-enabled backdoor trojans.

Microsoft Malware Protection Center Threat Report—Qakbot

Authors: Dan Kurc, Tareq Saade, Aaron Putnam, Holly Stewart | Download

This report provides an overview of the Win32/Qakbot (Qakbot) family of malware.

Battling the ZBot Threat

Authors: T.J. Campana, Joe Faulhaber, Paul Henry, Matt McCormack, Frank Simorjay, Holly Stewart | Download

This document provides an overview of the Win32/Zbot family of password-stealing trojans.