Important Information

On August 12th, 2022, many of Keysight’s Network Test, Network Visibility, & Edge to Core (NAS/formerly Ixia) products will migrate to a new license structure.

CRITICAL: If you perform licensing operations after August 12th, 2022, without upgrading the licensing software to the latest version, licenses may not register properly, and some features may be missing. This could impact testing and result in downtime.

For details, click here.

Displaying 38561 - 38580 of 58316

The sample has been identified as being associated with the 'Rkor' family of malware. The sample targets Android platforms. The sample is categorized as 'ransomware'. The sample was first seen in the wild on 2022-07-18.

The sample has been identified as being associated with the 'Disttrack' family of malware. The sample targets Win32 platforms. The sample is categorized as 'apt'. The sample was first seen in the wild on 2022-05-25.

The sample has been identified as being associated with the 'Sakurel' family of malware. The sample targets Win32 platforms. The sample is categorized as 'apt'. The sample was first seen in the wild on 2022-08-09.

The sample has been identified as being associated with the 'Shifu' family of malware. The sample targets Win32 platforms. The sample is categorized as 'retail'. The sample was first seen in the wild on 2022-03-23.

The sample has been identified as being associated with the 'Haperlock' family of malware. The sample targets Win32 platforms. The sample is categorized as 'ransomware'. The sample was first seen in the wild on 2022-04-07.

The sample has been identified as being associated with the 'Emotet' family of malware. The sample targets Win32 platforms. The sample is categorized as 'financial'. The sample was first seen in the wild on 2022-07-03.

The sample has been identified as being associated with the 'Dridex' family of malware. The sample targets Win32 platforms. The sample is categorized as 'financial'. The sample was first seen in the wild on 2022-01-16.

The sample has been identified as being associated with the 'Foreign' family of malware. The sample targets Win32 platforms. The sample is categorized as 'ransomware'. The sample was first seen in the wild on 2022-06-13.

This strike sends a malware sample known as Zeus. Zeus is a trojan that steals information such as banking credentials using methods such as key-logging and form-grabbing. The MD5 hash of this Zeus sample is 902e65b42621a37991cf902404940aa7.

The sample has been identified as being associated with the 'ZeGhost' family of malware. The sample targets Win32 platforms. The sample is categorized as 'apt'. The sample was first seen in the wild on 2022-04-17.

The sample has been identified as being associated with the 'Cryptodefense' family of malware. The sample targets Win32 platforms. The sample is categorized as 'ransomware'. The sample was first seen in the wild on 2022-06-26.

The sample has been identified as being associated with the 'Ramnit' family of malware. The sample platform is Document. The sample is categorized as 'financial'. The sample was first seen in the wild on 2022-08-04.

The sample has been identified as being associated with the 'TeslaCrypt' family of malware. The sample targets Win32 platforms. The sample is categorized as 'ransomware'. The sample was first seen in the wild on 2022-07-14.

CVSS: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

This strike exploits a vulnerability in HPs Intelligent Management Center where an unauthenticated user may download an arbitrary file.

The sample has been identified as being associated with the 'Zeus' family of malware. The sample targets Win32 platforms. The sample is categorized as 'financial'. The sample was first seen in the wild on 2022-05-08.

The sample has been identified as being associated with the 'Emotet' family of malware. The sample platform is Document. The sample is categorized as 'financial'. The sample was first seen in the wild on 2022-03-03.

The sample has been identified as being associated with the 'Ftcode' family of malware. The sample platform is Document. The sample is categorized as 'ransomware'. The sample was first seen in the wild on 2022-07-17.

The sample has been identified as being associated with the 'ZeGhost' family of malware. The sample targets Win32 platforms. The sample is categorized as 'apt'. The sample was first seen in the wild on 2022-05-24.

The sample has been identified as being associated with the 'Lyposit' family of malware. The sample targets Win32 platforms. The sample is categorized as 'ransomware'. The sample was first seen in the wild on 2022-06-08.

The sample has been identified as being associated with the 'Emotet' family of malware. The sample targets Win32 platforms. The sample is categorized as 'financial'. The sample was first seen in the wild on 2022-03-11.

Pages