Google
×
Past month
  • Any time
  • Past hour
  • Past 24 hours
  • Past week
  • Past month
  • Past year
All results
Nov 21, 2024 · This paper defines the NotPetya attack, explains how it works, and where and how it spreads. Also, this paper discusses four solutions available to recover.
Nov 18, 2024 · This article provides many ransomware examples from 1989 to the present and discusses the most significant ransomware attacks and their variants.
6 days ago · See for yourself with our downloadable ransomware tracker, regularly updated with incidents and attacks by name, location, date, and industry.
Nov 18, 2024 · This study addresses this critical gap by enhancing ransomware detection through the integration of machine learning and transfer learning techniques. Transfer ...
Nov 7, 2024 · To examine cyberattack challenges and responses in wartime our study builds on a case study ... The 2017 “Petya virus” targeted the electronic document ...
23 hours ago · A supply chain attack is a cyber-attack that seeks to damage an organization by targeting less secure elements in the supply chain.
Nov 9, 2024 · A particularly compelling case study involves the Petya ransomware attack. In 2017, Petya initially spread through phishing emails within Germany's train ...
Nov 20, 2024 · Our review delves into the existing literature on ransomware detection, specifically examining the machine-learning techniques, detection approaches, and ...
Nov 18, 2024 · Cyberwarfare is the use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems.
Nov 21, 2024 · The cybersecurity community has explored automated malware behavior analysis in the last decade. Many detection mechanisms have been proposed to prevent attacks ...