Analyzing the 2021 Kaseya Ransomware Attack: Combined Spearphishing Through SonicWall SSLVPN Vulnerability
S Bhunia, M Blackert, H Deal, A DePero… - IET Information …, 2025 - Wiley Online Library
In July 2021, the IT management software company Kaseya was the victim of a ransomware
cyberattack. The perpetrator of this attack was ransomware evil (REvil), an allegedly …
cyberattack. The perpetrator of this attack was ransomware evil (REvil), an allegedly …
[HTML][HTML] Shared file protection against unauthorised encryption using a Buffer-Based Signature Verification Method
Understanding the attributes of critical data and implementing suitable security measures
help organisations bolster their data-protection strategies and diminish the potential impacts …
help organisations bolster their data-protection strategies and diminish the potential impacts …
MIRAD: A Method for Interpretable Ransomware Attack Detection
B Marcinkowski, M Goschorska, N Wileńska… - IEEE …, 2024 - ieeexplore.ieee.org
In the face of escalating crypto-ransomware attacks, we introduce MIRAD, a novel dynamic
detection method. MIRAD leverages machine learning to continuously monitor API calls and …
detection method. MIRAD leverages machine learning to continuously monitor API calls and …
An Efficient Malware Detection Approach Based on Machine Learning Feature Influence Techniques for Resource-Constrained Devices
The growing use of computer resources in modern society makes it extremely vulnerable to
several cyber-attacks, including unauthorized access to equipment and computer systems' …
several cyber-attacks, including unauthorized access to equipment and computer systems' …
SPECTRE: A Hybrid System for an Adaptative and Optimised Cyber Threats Detection, Response and Investigation in Volatile Memory
The increasing sophistication of modern cyber threats, particularly file-less malware relying
on living-off-the-land techniques, poses significant challenges to traditional detection …
on living-off-the-land techniques, poses significant challenges to traditional detection …
Enhancing Cybersecurity in Financial Services using Single Value Neutrosophic Fuzzy Soft Expert Set.
A Ahmed - International Journal of Neutrosophic Science …, 2024 - search.ebscohost.com
Cybersecurity has become a primary concern as the financial sectors generally handle
increasing cyber-attacks and an increasing danger of financial crime. Recently, ransomware …
increasing cyber-attacks and an increasing danger of financial crime. Recently, ransomware …
Detecting obfuscated malware infections on Windows using ensemble learning techniques
Y Imamverdiyev, E Baghirov… - Информатика и …, 2025 - ia.spcras.ru
In the internet and smart devices era, malware detection has become crucial for system
security. Obfuscated malware poses significant risks to various platforms, including …
security. Obfuscated malware poses significant risks to various platforms, including …
Трехмерная реконструкция отдельных изображений с помощью бинарного классификатора
СА Ресен - Научно-технический вестник информационных …, 2024 - ntv.elpub.ru
Аннотация Интеллектуальные системы требуют взаимодействия с различными
сложными окружающими средами. Например, роботу может потребоваться …
сложными окружающими средами. Например, роботу может потребоваться …
Comprehensive Ransomware Detection: Optimization of Feature Selection through Machine Learning Algorithms and Explainable AI on Memory Analysis
L Leonel, DN Molinos, RS Miani - … de Segurança da Informação e de …, 2024 - sol.sbc.org.br
The increase in ransomware attacks has underscored the need for ro bust cybersecurity
measures. To combat these sophisticated threats, organiza tions must implement strong …
measures. To combat these sophisticated threats, organiza tions must implement strong …
A Machine Learning Approach for Detecting Obfuscated Malware on Enterprise Network Endpoints
BA Osawe - 2025 - search.proquest.com
Perimeter security ensures users are verified once, after which they would have access to all
the resources residing on a network. This made networks vulnerable to advanced persistent …
the resources residing on a network. This made networks vulnerable to advanced persistent …