ID | Votes | Profile Description |
---|---|---|
petya | 1 | Petya is a type of malware, specifically ransomware, that infected Windows-based systems primarily through phishing emails. It was notorious for its ability to disrupt operations and hold data hostage for ransom. Petya, along with other types of ransomware like WannaCry, NotPetya, TeslaCrypt, and Da |
WannaCry | 1 | WannaCry is a type of malware, specifically ransomware, that caused significant global disruption in 2017. It exploited Windows SMBv1 Remote Code Execution Vulnerabilities (CVE-2017-0144, CVE-2017-0145, CVE-2017-0143), which allowed it to spread rapidly and infect over 200,000 machines across more t |
REvil | 1 | REvil is a notorious form of malware, specifically ransomware, that infiltrates systems to disrupt operations and steal data. The ransomware operates on a Ransomware as a Service (RaaS) model, which gained traction in 2020. In this model, REvil, like other first-stage malware such as Dridex and Goot |
DarkSide | 1 | DarkSide is a notable threat actor that emerged in the cybersecurity landscape with its advanced ransomware operations. In 2021, the group gained significant attention for its attack on the United States' largest oil pipeline, Colonial Pipeline, causing a temporary halt to all operations for three d |
Badblock | 1 | BadBlock is a recognized threat actor in the cybersecurity industry, known for its involvement in malicious activities. These activities typically involve the execution of ransomware attacks that encrypt user files and demand a ransom for their decryption. This group has been linked to major ransomw |
Teslacrypt | 1 | TeslaCrypt is a notable threat actor that emerged with a focus on targeting computer gamers. This malicious entity was responsible for executing ransomware attacks, encrypting victims' files and demanding payment for their release. The group gained notoriety with several versions of their ransomware |
NotPetya | 1 | NotPetya is a notorious malware that was unleashed in 2017, primarily targeting Ukraine but eventually impacting systems worldwide. This malicious software, which initially appeared to be ransomware, was later revealed to be data destructive malware, causing widespread disruption rather than seeking |
Dcrat | 1 | DcRAT is a malicious software that has been used in various cyberattacks throughout 2023 and into 2024. The malware, distributed through fake OnlyFans content, deceptive Google Meet sites, and spoofed Skype and Zoom websites, downloads a DcRAT payload when users click on certain elements. This Remot |
ID | Type | Votes | Profile Description |
---|---|---|---|
SamSam | Unspecified | 1 | SamSam is a type of malware, specifically ransomware, that was first deployed by the cybercriminal group GOLD LOWELL in 2015. This malicious software is designed to infiltrate systems through suspicious downloads, emails, or websites and then exploit the compromised system, often stealing personal i |
Maze Ransomware | Unspecified | 1 | Maze ransomware is a type of malware that emerged in 2019, employing a double extortion tactic to wreak havoc on its victims. This malicious software infiltrates systems through suspicious downloads, emails, or websites and can steal personal information, disrupt operations, or hold data hostage for |
ID | Type | Votes | Profile Description |
---|---|---|---|
No associations to display |
ID | Type | Votes | Profile Description |
---|---|---|---|
Heartbleed | Unspecified | 1 | Heartbleed is a significant vulnerability (CVE-2014-0160) that was identified in the OpenSSL cryptographic software library in 2014. This flaw allows an attacker to read server memory and send additional data, leading to potential information leaks – hence the term "bleeding out data". The vulnerabi |
Source | CreatedAt | Title |
---|---|---|
DARKReading | 2 months ago | AI Voice Generator App Used to Drop Gipy Malware |
CERT-EU | 5 months ago | Techrights — Links 04/03/2024: Techno-Babble in Tech Job Ads and Vision Pro Already Breaking Apart |
CERT-EU | 7 months ago | The Unpredictable But Entirely Possible Events That Could Throw 2024 Into Turmoil |
CERT-EU | 7 months ago | When Silicon Valley’s AI warriors came to Washington |
CERT-EU | 7 months ago | Navigating The Cybersecurity Landscape In 2024 | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting |
CERT-EU | 8 months ago | 'Leave the World Behind' review: Star-studded apocalypse thriller overstays its welcome |
CERT-EU | 8 months ago | The new Tesla Cybertruck is super-fast and bullet-proof—but who is it for? An expert analyzes the design |
CERT-EU | 8 months ago | Elon Musk promised to kill the bots, instead we got ads for fake luxury goods |
CERT-EU | 8 months ago | Tesla's Cybertruck is a dystopian, masturbatory fantasy |
CERT-EU | 8 months ago | New Phobos ransomware variant implicates VX-Underground |
CERT-EU | 10 months ago | Liberal media's favorite COVID doctor urges enforcement against 'anti-science attitudes' |
CERT-EU | 10 months ago | Hands-on review: Cyberpunk 2077 2.0 and the Phantom Liberty DLC expansion (PC) |
CERT-EU | 10 months ago | Cyber threats require U.S. allies to have 'zero trust strategy' |
CERT-EU | 10 months ago | Supreme Court extends pause on appeals court ruling on Biden admin censorship efforts |
CERT-EU | 10 months ago | Biden may have blundered by taking censorship case to Supreme Court |
CERT-EU | 10 months ago | U.S. national security 'blind spot': Government leaders with dementia |
CERT-EU | 10 months ago | 30 members of Congress tell DOJ to protect children from AI exploitation |
CERT-EU | 10 months ago | Canadian Typography Archives, Library of Congress, Tech Legal Cases, More: Thursday ResearchBuzz, September 14, 2023 |
CERT-EU | 10 months ago | 'Bang!' School that punished boy for 'finger gun' gets skewered |
CERT-EU | a year ago | Quantum Technology Industry Report 2022 Published: The First Annual Guide to the Quantum Technology Industry |