Google
×
Past month
  • Any time
  • Past hour
  • Past 24 hours
  • Past week
  • Past month
  • Past year
All results
Nov 14, 2024 · An archive of various ransomware samples for reverse engineering and research. - SpiceNWolf/Ransomware-Sample-Database.
Nov 18, 2024 · Experts believe the ransomware is tied to the Petya attack in the Ukraine, due to Bad Rabbit's code having many overlapping and analogical elements to the code ...
3 days ago · The backdoor was cleverly hidden in the “addToQueue” function, seamlessly blending into legitimate code. Learn more here https://thehackernews. com/2024/12/ ...
Nov 19, 2024 · The vulnerability exists in the plugin's source code that handles file uploads to PHP servers due to software allows upload of arbitrary files to the system.
4 days ago · Welcome to the new Rockwell Automation Security Advisory portal. Click here to read more about our security advisory initiative.
3 days ago · Microsoft Defender for Endpoint utilizes the anti-malware Scan Interface (AMSI) to enhance protection against fileless malware, dynamic script-based attacks.
Missing: source | Show results with:source
1 day ago · This guest-authored blog post examines how Cyberseer detected highly advanced red team activities with Darktrace's Enterprise Immune System.
Nov 21, 2024 · Junk code obfuscation is a technique which makes executable files impossible to decompile into source code, or impedes the ability to understand a ...
Nov 18, 2024 · In this paper, we introduce an unsupervised transfer learning approach using a co-clustering algorithm to detect various ransomware families across different ...
1 day ago · A malicious actor infected the source code of a software update with a backdoor code made to look legitimate. Customers began installing the faulty ...