Common Information
Type Value
Value
zombieware
Category Malware_Classification
Type Malware_Classification
Misp Type Taxonomy
Description None
Details Published Attributes CTI Title
Details Website 2754-08-03 37 Virus Bulletin :: VB2018 paper: Unpacking the packed unpacker: reversing an Android anti-analysis native library
Details Website 2574-01-02 0 Editors Picks, Apps We Recommend | TechSpot
Details Website 2090-01-13 50 “苦象”组织上半年针对我国的攻击活动分析
Details Website 2062-07-31 28 APT28携小众压缩包诱饵对北约、中亚目标的定向攻击分析
Details Website 2061-05-15 4 Flash Notice: Critical Linux Kernel Vulnerability Can Lead to Remote Code Execution
Details Website 2035-08-05 23 Inside Jahoo (Otlard.A ?) - A spam Botnet
Details Website 2028-10-24 0 MIT Technology Review Insights Survey on Zero Trust in Cybersecurity
Details Website 2028-02-03 0 Zemana Anti Malware: Best Premium & Free Malware Removal Software
Details Website 2028-01-01 3 A Tour of the Worm
Details Website 2025-11-07 1 Vault7 - Home
Details Website 2025-01-01 11 Visionaries Have Democratised Remote Network Access – Citrix Virtual Apps and Desktops (CVE Unknown) | CTF导航
Details Website 2024-12-19 17 Silent Push uncovers a large Russian Ursnif/Gozi banking trojan operation targeting global AnyDesk users. — Silent Push Threat Intelligence
Details Website 2024-12-17 1 Log4shell: a threat intelligence perspective — Silent Push Threat Intelligence
Details Website 2024-12-13 17 Rhysida Ransomware analysis - A painful sting to Insomniac Games — ShadowStackRE
Details Website 2024-12-06 8 Qilin Ransomware malware analysis — ShadowStackRE
Details Website 2024-12-03 120 Malvertisment campaigns: Uncovering more IoCs from the recent Windows Defender fraud — Silent Push Threat Intelligence
Details Website 2024-12-03 48 Privacy tools (not) for you — Silent Push Threat Intelligence
Details Website 2024-11-26 33 LostTrust Ransomware - Trust nothing — ShadowStackRE
Details Website 2024-11-17 0 Weekly #InfoSec News Roundup
Details Website 2024-11-17 12 Boss of the SOC Version 1 Scenario 2
Details Website 2024-11-17 0 Understanding Buffer Overflow Attacks: A Deep Dive Into Memory Corruption
Details Website 2024-11-17 0 Stakeholders demand robust data protection, cybersecurity measures | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
Details Website 2024-11-17 0 The Evolution of Ransomware: From Simple Encryption to Sophisticated Extortion Tactics
Details Website 2024-11-17 0 Buffer Overflow
Details Website 2024-11-17 0 [RAWORLD] - Ransomware Victim: Ge****og - RedPacket Security