Important Information

On August 12th, 2022, many of Keysight’s Network Test, Network Visibility, & Edge to Core (NAS/formerly Ixia) products will migrate to a new license structure.

CRITICAL: If you perform licensing operations after August 12th, 2022, without upgrading the licensing software to the latest version, licenses may not register properly, and some features may be missing. This could impact testing and result in downtime.

For details, click here.

Displaying 38621 - 38640 of 58316

The sample has been identified as being associated with the 'ZeGhost' family of malware. The sample targets Win32 platforms. The sample is categorized as 'apt'. The sample was first seen in the wild on 2022-04-25.

The sample has been identified as being associated with the 'ZeGhost' family of malware. The sample targets Win32 platforms. The sample is categorized as 'apt'. The sample was first seen in the wild on 2022-02-01.

The sample has been identified as being associated with the 'ZeGhost' family of malware. The sample targets Win32 platforms. The sample is categorized as 'apt'. The sample was first seen in the wild on 2022-06-13.

The sample has been identified as being associated with the 'TeslaCrypt' family of malware. The sample targets Win32 platforms. The sample is categorized as 'ransomware'. The sample was first seen in the wild on 2022-06-20.

The sample has been identified as being associated with the 'TeslaCrypt' family of malware. The sample targets Win32 platforms. The sample is categorized as 'ransomware'. The sample was first seen in the wild on 2022-06-27.

The sample has been identified as being associated with the 'ZeGhost' family of malware. The sample targets Win32 platforms. The sample is categorized as 'apt'. The sample was first seen in the wild on 2022-09-11.

The sample has been identified as being associated with the 'ZeGhost' family of malware. The sample targets Win32 platforms. The sample is categorized as 'apt'. The sample was first seen in the wild on 2022-05-19.

This strike simulates the network transfer of the IcedID iso. When executed this malware mounts to the DVD drive on the machine containing a shortcut lnk and the IcedID malicious dll. Once the shortcut is executed the dll is loaded.

The sample has been identified as being associated with the 'Gandcrab' family of malware. The sample targets Win32 platforms. The sample is categorized as 'ransomware'. The sample was first seen in the wild on 2022-05-02.

The sample has been identified as being associated with the 'Shifu' family of malware. The sample targets Win32 platforms. The sample is categorized as 'retail'. The sample was first seen in the wild on 2022-07-25.

The sample has been identified as being associated with the 'Emotet' family of malware. The sample targets Win32 platforms. The sample is categorized as 'financial'. The sample was first seen in the wild on 2022-05-18.

The sample has been identified as being associated with the 'Sakurel' family of malware. The sample targets Win32 platforms. The sample is categorized as 'apt'. The sample was first seen in the wild on 2022-03-21.

The sample has been identified as being associated with the 'Cryptodefense' family of malware. The sample targets Win32 platforms. The sample is categorized as 'ransomware'. The sample was first seen in the wild on 2022-08-08.

The sample has been identified as being associated with the 'Virlock' family of malware. The sample targets Win32 platforms. The sample is categorized as 'ransomware'. The sample was first seen in the wild on 2022-01-12.

CVSS: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

This strike exploits an initialization vulnerability within RealNetworks RealPlayer. An overly long string that is passed to the CDDA URI causes an initialization failure, and because this isn't handeled properly uninitialized memory is accessed.

The sample has been identified as being associated with the 'ZeGhost' family of malware. The sample targets Win32 platforms. The sample is categorized as 'apt'. The sample was first seen in the wild on 2022-04-14.

The sample has been identified as being associated with the 'Andromeda' family of malware. The sample targets Win32 platforms. The sample is categorized as 'financial'. The sample was first seen in the wild on 2022-05-05.

The sample has been identified as being associated with the 'Shifu' family of malware. The sample targets Win32 platforms. The sample is categorized as 'retail'. The sample was first seen in the wild on 2022-01-26.

The sample has been identified as being associated with the 'Shifu' family of malware. The sample targets Win32 platforms. The sample is categorized as 'retail'. The sample was first seen in the wild on 2022-02-08.

The sample has been identified as being associated with the 'Virlock' family of malware. The sample targets Win32 platforms. The sample is categorized as 'ransomware'. The sample was first seen in the wild on 2022-03-10.

Pages