Past year
All results
- All results
- Verbatim
May 3, 2024 · This repository contains 130 malware and ransomware samples for research and analysis purposes. - ThatSINEWAVE/Malware-Samples.
Feb 22, 2024 · This article describes the process of capturing encryption keys from ransomware using Elastic Defend ransomware protection.
Missing: Petya | Show results with:Petya
Nov 18, 2024 · Ransomware, a type of malicious software or malware, is designed to deny access to computer systems or sensitive data until ransom is paid.
Jul 15, 2024 · Ransomware is a type of malware that permanently blocks access to the victim's personal data unless a "ransom" is paid. While some simple ransomware may ...
Jun 4, 2024 · Ransomware is a type of malware that holds a victim's sensitive data or device hostage, threatening to keep it locked—or worse—unless the victim pays a ransom ...
Jan 16, 2024 · A list of known (documented, reported) attacks involving compromises of software supply chains (from latest to oldest).
Missing: Petya | Show results with:Petya
Aug 3, 2024 · Multiple File Selection: Users can select and process multiple files in one go, enhancing productivity. Capstone Integration: Leverages the Capstone disassembly ...
Nov 21, 2024 · To address these threats, cyber security professionals must have the ability to accurately and quickly detect potential hazards and identify ongoing attacks.
Apr 29, 2024 · This blog post looks at real-world case studies to highlight the seriousness of software supply chain breaches, the extent of damage they can cause,
Jan 15, 2024 · The format used for creating and editing in the Attack Flow Builder. JSON (.json). The machine-readable format for exchanging flows. Graphviz (.dot). An example ...
Missing: Petya | Show results with:Petya