Important Information

On August 12th, 2022, many of Keysight’s Network Test, Network Visibility, & Edge to Core (NAS/formerly Ixia) products will migrate to a new license structure.

CRITICAL: If you perform licensing operations after August 12th, 2022, without upgrading the licensing software to the latest version, licenses may not register properly, and some features may be missing. This could impact testing and result in downtime.

For details, click here.

Displaying 38521 - 38540 of 58316

The sample has been identified as being associated with the 'Ramnit' family of malware. The sample platform is Document. The sample is categorized as 'financial'. The sample was first seen in the wild on 2022-03-28.

The sample has been identified as being associated with the 'Cryptodefense' family of malware. The sample targets Win32 platforms. The sample is categorized as 'ransomware'. The sample was first seen in the wild on 2022-08-09.

The sample has been identified as being associated with the 'Ramnit' family of malware. The sample platform is Document. The sample is categorized as 'financial'. The sample was first seen in the wild on 2022-04-12.

The sample has been identified as being associated with the 'Cryptodefense' family of malware. The sample targets Win32 platforms. The sample is categorized as 'ransomware'. The sample was first seen in the wild on 2022-02-27.

This strike sends a malware sample known as Gamarue. Win.Trojan.Gamarue covers a family that, after installing itself on the system to survive after reboot, will spread itself to USB drives and modify system configuration settings to weaken its security and disable certain features, such as the task manager or the Windows shell, in order to protect itself. It can exfiltrate sensitive data and receive...

The sample has been identified as being associated with the 'TeslaCrypt' family of malware. The sample platform is Document. The sample is categorized as 'ransomware'. The sample was first seen in the wild on 2022-02-02.

The sample has been identified as being associated with the 'CosmicDuke' family of malware. The sample targets Win32 platforms. The sample is categorized as 'apt'. The sample was first seen in the wild on 2022-05-23.

The sample has been identified as being associated with the 'TrickBot' family of malware. The sample targets Win32 platforms. The sample is categorized as 'financial'. The sample was first seen in the wild on 2022-07-27.

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits a vulnerable ActiveX control in IBM SPSS SamplePower. The ComboList and ColComboList values in the VSFlexGrid ActiveX control will copy a string to a buffer without validation. Successful exploitation can result in arbitrary code execution or abnormal termination of the browser.

The sample has been identified as being associated with the 'Pornoblocker' family of malware. The sample targets Win32 platforms. The sample is categorized as 'ransomware'. The sample was first seen in the wild on 2022-02-10.

The sample has been identified as being associated with the 'Shifu' family of malware. The sample targets Win32 platforms. The sample is categorized as 'retail'. The sample was first seen in the wild on 2022-05-08.

The sample has been identified as being associated with the 'Shifu' family of malware. The sample targets Win32 platforms. The sample is categorized as 'retail'. The sample was first seen in the wild on 2022-03-17.

The sample has been identified as being associated with the 'Zeus' family of malware. The sample targets Win32 platforms. The sample is categorized as 'financial'. The sample was first seen in the wild on 2022-06-14.

The sample has been identified as being associated with the 'TeslaCrypt' family of malware. The sample targets Win32 platforms. The sample is categorized as 'ransomware'. The sample was first seen in the wild on 2022-07-10.

The sample has been identified as being associated with the 'Shifu' family of malware. The sample targets Win32 platforms. The sample is categorized as 'retail'. The sample was first seen in the wild on 2022-06-20.

The sample has been identified as being associated with the 'Sakurel' family of malware. The sample targets Win32 platforms. The sample is categorized as 'apt'. The sample was first seen in the wild on 2022-05-19.

The sample has been identified as being associated with the 'Shifu' family of malware. The sample targets Win32 platforms. The sample is categorized as 'retail'. The sample was first seen in the wild on 2022-03-20.

The sample has been identified as being associated with the 'BlackMoon' family of malware. The sample targets Win32 platforms. The sample is categorized as 'financial'. The sample was first seen in the wild on 2022-01-10.

The sample has been identified as being associated with the 'TeslaCrypt' family of malware. The sample targets Win32 platforms. The sample is categorized as 'ransomware'. The sample was first seen in the wild on 2022-08-21.

The sample has been identified as being associated with the 'Sakurel' family of malware. The sample targets Win32 platforms. The sample is categorized as 'apt'. The sample was first seen in the wild on 2022-04-13.

Pages