ID | Type | Votes | Profile Description |
---|---|---|---|
WannaCry | Unspecified | 2 | WannaCry is a type of malware, specifically ransomware, that caused significant global disruption in 2017. It exploited Windows SMBv1 Remote Code Execution Vulnerabilities (CVE-2017-0144, CVE-2017-0145, CVE-2017-0143), which allowed it to spread rapidly and infect over 200,000 machines across more t |
Stuxnet | Unspecified | 1 | Stuxnet, a notorious malware discovered in 2010, is one of the most infamous Advanced Persistent Threat (APT) attacks in history. This military-grade cyberweapon was co-developed by the United States and Israel to specifically target Iran's nuclear enrichment facility at Natanz. The Stuxnet worm, a |
Zeus | Unspecified | 1 | Zeus is a type of malware, short for malicious software, designed to exploit and damage computers or devices. It infiltrates systems through suspicious downloads, emails, or websites, often unbeknownst to the user. Once inside, Zeus can steal personal information, disrupt operations, or even hold da |
ID | Type | Votes | Profile Description |
---|---|---|---|
No associations to display |
ID | Type | Votes | Profile Description |
---|---|---|---|
No associations to display |
Source | CreatedAt | Title |
---|---|---|
Quick Heal Technologies Ltd. | 4 days ago | Think Your Computer is Safe? Unmasking the Most Famous Computer Viruses in the Cyberworld! |
CERT-EU | 7 months ago | Navigating the Digital Frontier: The Evolution of Cyber Vulnerabilities in Credit Unions |
SecurityIntelligence.com | 8 months ago | Where Everything Old is New Again: Operational Technology and Ghost of Malware Past |
CERT-EU | 9 months ago | Microsoft reflects on 20 years of Windows Patch Tuesday |
CERT-EU | 9 months ago | Cybersecurity Awareness Month 2023: Reflecting on 20 years of Patch Tuesday |
CERT-EU | 10 months ago | IBM Report: Ransomware Persisted Despite Improved Detection in 2022 - MC Press Online |
InfoSecurity-magazine | a year ago | DGA Behavior Shifts Raise Cybersecurity Concerns |
DARKReading | a year ago | Threat Actor Names Proliferate, Adding Confusion |
CERT-EU | a year ago | Geographical aspects of cybercrime: A literature review | #cybercrime | #infosec | National Cyber Security Consulting |
CERT-EU | a year ago | JBS’s cybersecurity was unusually poor prior to 2021 ransomware attack, internal homeland security records show | #ransomware | #cybercrime | National Cyber Security Consulting |
MITRE | a year ago | Primary Stuxnet Advisory | CISA |
CERT-EU | a year ago | Almanach wirusów, trojanów, rootkitów. Jak powstały, w jaki sposób infekowały |
CERT-EU | a year ago | X-Force Threat Intelligence Index di Ibm - Cyber Security 360 |
CERT-EU | a year ago | What Is Domain Generation Algorithm? Definition and Role in Malware Attacks |
CERT-EU | a year ago | History of Computer Hacking and Cybersecurity Threats: From the 50s to Today | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware – National Cyber Security Consulting |
CERT-EU | a year ago | How the ZeuS Trojan Info Stealer Changed Cybersecurity |
CERT-EU | a year ago | Ataki ransomware nadal są popularne |