Operation Red October or Red October was a cyberespionage malware program discovered in October 2012 and uncovered in January 2013 by Russian firm Kaspersky...
9 KB (310 words) - 11:05, 17 February 2025
in G.I. Joe Red October (malware), a piece of cyber espionage malware revealed in 2013 Red October (Philippines), also known as "Red October plot", an alleged...
651 bytes (111 words) - 01:00, 5 November 2023
used by GoldenJackal malware is typically used by Turla, suggesting the groups may be connected. Agent.BTZ Red October (malware) "The Russian Britney...
5 KB (398 words) - 17:15, 16 October 2024
Kaspersky Lab (section Red October)
bluetooth or USB drives. In January 2013, Kaspersky discovered the Red October malware, which had been used for widespread cyber-espionage for five years...
96 KB (8,433 words) - 07:22, 3 June 2025
Linux malware includes viruses, Trojans, worms and other types of malware that affect the Linux family of operating systems. Linux, Unix and other Unix-like...
58 KB (4,841 words) - 15:41, 27 May 2025
Malware (a portmanteau of malicious software) is any software intentionally designed to cause disruption to a computer, server, client, or computer network...
76 KB (7,664 words) - 19:23, 5 June 2025
Fileless malware is a variant of computer related malicious software that exists exclusively as a computer memory-based artifact i.e. in RAM. It does...
14 KB (1,472 words) - 17:21, 12 September 2024
Mobile security (category Articles with unsourced statements from October 2023)
weakness. Some malware makes use of the common user's limited knowledge. Only 2.1% of users reported having first-hand contact with mobile malware, according...
90 KB (11,017 words) - 00:11, 18 May 2025
2003 (redirect from October 1, 2003)
throughout the world.: 484 The SQL Slammer worm was among several major malware programs to spread during the year through vulnerabilities in Microsoft...
117 KB (11,413 words) - 18:54, 9 June 2025
Spread of the Code-Red Worm (CRv2)". CAIDA Analysis. Retrieved October 3, 2006. "Discoveries – Video – The Spread of the Code Red Worm". National Science...
7 KB (709 words) - 02:07, 15 April 2025
Blue Pill (software) (redirect from Blue pill (malware))
Joanna Rutkowska. King, S. T.; Chen, P. M. (2006). "SubVirt: implementing malware with virtual machines". 2006 IEEE Symposium on Security and Privacy (S&P'06)...
7 KB (718 words) - 18:59, 13 February 2025
Internet, though it did not contain the specific DroidDream malware. New apps featuring the malware, renamed DroidDream Light, surfaced the following June...
171 KB (12,421 words) - 13:30, 22 May 2025
and malware, especially when combined with OpenAI Codex. CyberArk researchers demonstrated that ChatGPT could be used to create polymorphic malware that...
185 KB (16,327 words) - 01:00, 13 June 2025
called Bitdefender Central. Currently, Bitdefender offers antivirus and malware protection services, as well as password management, identity threat protection...
25 KB (2,126 words) - 10:15, 4 June 2025
Rootkit (redirect from Stealth malware)
term "rootkit" has negative connotations through its association with malware. Rootkit installation can be automated, or an attacker can install it after...
69 KB (7,095 words) - 01:49, 26 May 2025
Chrome Web Store (section Malware)
visits to its own websites had been altered by extensions with adware. Malware remains a problem on Chrome Web Store. In January 2018, researchers from...
11 KB (769 words) - 04:52, 13 June 2025
of Manila, Philippines, created the malware. Because there were no laws in the Philippines against making malware at the time of its creation, the Philippine...
33 KB (3,222 words) - 03:49, 1 June 2025
Trojan horse (computing) (redirect from Trojan (malware))
horse (or simply trojan; often capitalized, but see below) is a kind of malware that misleads users as to its true intent by disguising itself as a normal...
19 KB (1,865 words) - 14:43, 18 April 2025
2016. Retrieved 20 March 2016. "Ransomwares, divulgation de données et malware-as-a-service dans le Dark Web. Partie 1/2". 21 May 2021. Archived from...
59 KB (5,350 words) - 13:22, 3 June 2025
Timeline of computer viruses and worms (category Malware)
of noteworthy computer viruses, computer worms, Trojan horses, similar malware, related research and events. John von Neumann's article on the "Theory...
71 KB (7,752 words) - 16:45, 10 May 2025
data was collected contained malware, and they said that the advertisements they serve are monitored for malware and malware is immediately removed. In...
93 KB (7,796 words) - 13:58, 9 June 2025
"SWIFT attackers' malware linked to more financial attacks". Symantec. May 26, 2016. Retrieved October 19, 2017. Ashok, India (October 17, 2017). "Lazarus:...
49 KB (5,010 words) - 05:54, 11 June 2025
Spyware (category Types of malware)
Spyware (a portmanteau for spying software) is any malware that aims to gather information about a person or organization and send it to another entity...
78 KB (8,732 words) - 21:22, 31 May 2025
The Murderbot Diaries (section All Systems Red (2017))
it was the result of another mining operation's sabotage attempt using malware, which made all of the facility's SecUnits go rogue. The facility's...
42 KB (4,772 words) - 03:54, 31 May 2025
Blue screen of death (redirect from Red Screen of Death)
hardware failures, an issue with or without a device driver, viruses, malware, and other factors such as intentional user action. Blue screen errors...
46 KB (5,037 words) - 20:04, 27 May 2025
hosts. In October, Unit 42 warned of a new crypto mining malware, XMRig, that comes bundled with infected Adobe Flash updates. The malware uses the victim's...
25 KB (1,961 words) - 04:05, 19 March 2025
updating applications, uninstalling software, and preventing malware and adware. The software’s malware removal functionality is powered by MacPaw's proprietary...
12 KB (816 words) - 10:24, 3 May 2025
found that advertisements displayed by popular porn websites contained malware programs, which install harmful files on users' machines without their...
99 KB (8,414 words) - 03:46, 12 June 2025
of Ukraine. The rules are: Do not attack civilian targets. Do not use malware or other tools or techniques that spread automatically and attack military...
6 KB (430 words) - 01:07, 13 July 2024
Computer security (redirect from Economic impact of malware)
tools to defend the business." SMBs are most likely to be affected by malware, ransomware, phishing, man-in-the-middle attacks, and Denial-of Service...
220 KB (22,312 words) - 12:28, 12 June 2025