Solutions for:
Home Products
Small Business
Medium Business
Enterprise
Vulnerabilities
Threats
English
Русский
日本語
LatAm
Türk
Brasileiro
Français
Český
Deutsch
Home
Threats
Threat
Class
Platform
Detect Date
Trojan-Dropper.Win32.Dorgam.zbv
Trojan-Dropper
Win32
Trojan-Spy.Win32.Stealer.fcho
Trojan-Spy
Win32
Downloader.Win32.LMN.wyzx
Downloader
Win32
HackTool.Win32.FlyStudio.bcmg
HackTool
Win32
Trojan.Win32.Copak.bouwj
Trojan
Win32
Trojan.Win32.Copak.bouvw
Trojan
Win32
Trojan-Ransom.Win32.Zerber.gjei
Trojan-Ransom
Win32
Trojan.Win32.Vemptik.pvp
Trojan
Win32
Trojan.Win32.Copak.bouvp
Trojan
Win32
Trojan.Win32.ShipUp.kgmp
Trojan
Win32
Find out the statistics of the vulnerabilities spreading in your region:
statistics.securelist.com
Check my region
Trojan.Win32.Staser.esie
Trojan
Win32
HackTool.Win32.FlyStudio.bclz
HackTool
Win32
Trojan-Spy.MSIL.Keylogger.dhyo
Trojan-Spy
MSIL
AdWare.Win32.Agent.xxzttz
Adware
Win32
Trojan-Dropper.Win32.Dycler.zxe
Trojan-Dropper
Win32
Trojan.Win32.Vemptik.pvu
Trojan
Win32
Trojan.Win32.Copak.bouwp
Trojan
Win32
Trojan.Win32.Copak.bouxc
Trojan
Win32
Trojan.Win32.Penguish.ali
Trojan
Win32
Trojan.Win32.Pits.bbu
Trojan
Win32
Trojan.Win32.Injuke.mamr
Trojan
Win32
Trojan-Dropper.Win32.Agent.tfrzar
Trojan-Dropper
Win32
Downloader.Win32.Snojan.hgcm
Downloader
Win32
Trojan.Win32.Copak.bouwu
Trojan
Win32
Trojan.Win32.Agent.xbkmre
Trojan
Win32
Trojan-Ransom.Win32.Zerber.gjeg
Trojan-Ransom
Win32
Trojan.Win32.Vemptik.pvw
Trojan
Win32
Trojan.Win32.Runner.lxa
Trojan
Win32
Trojan-Dropper.Win32.Balu.ck
Trojan-Dropper
Win32
Trojan.Win32.Copak.bouux
Trojan
Win32
1
2757
2758
2759
2760
2761
46137
82741—82770 из 1384089
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Related articles
02 October 2024
Securelist
Finding a needle in a haystack: Machine learning at the forefront of threat hunting research
01 October 2024
Securelist
Key Group: another ransomware group using leaked builders
26 September 2024
Securelist
Threat landscape for industrial automation systems, Q2 2024
25 September 2024
Securelist
From 12 to 21: how we discovered connections between the Twelve and BlackJack groups
24 September 2024
Securelist
Web tracking report: who monitored users’ online activities in 2023–2024 the most
23 September 2024
Securelist
How the Necro Trojan infiltrated Google Play, again
Found an inaccuracy in the description of this vulnerability?
If you found a new Threat or Vulnerability, please, let us know by email:
newvirus@kaspersky.com
It's clear
Found a new Threat or Vulnerability?
If you found a new Threat or Vulnerability, please, let us know by email:
newvirus@kaspersky.com
It's clear
Vulnerabilities
Vendors
Products
Threats
Eng
Solutions for
Home Products
Small Business
Medium Business
Enterprise
Select language
English
Русский
日本語
LatAm
Türk
Brasileiro
Français
Český
Deutsch
Sorting
Threat
Confirm
Confirm changes?
Yes
No
Your message has been sent successfully.