New Decryptor Unlocks CryptXXX v3 Files
Researchers have neutralized the threat of the latest strain of CryptXXX v.3 ransomware, releasing a decryption tool for unlocking files. Continue reading New Decryptor Unlocks CryptXXX v3 Files
Collaborate Disseminate
Researchers have neutralized the threat of the latest strain of CryptXXX v.3 ransomware, releasing a decryption tool for unlocking files. Continue reading New Decryptor Unlocks CryptXXX v3 Files
Researchers have discovered that criminals behind the latest Cerber ransomware variant are leveraging Google redirects and Tor2Web proxies in a new and novel way to evade detection. Continue reading New Cerber Variant Leverages Tor2Web Proxies, Google Redirects
Low-tech malware snares users via flaws in social networks’ code to spread automatically. Continue reading Locky ransomware uses decoy image files to ambush Facebook, LinkedIn accounts
Low-tech malware snares users via flaws in social networks’ code to spread automatically. Continue reading Locky ransomware uses decoy image files to ambush Facebook, LinkedIn accounts
Researchers have spotted an increase in Nemucod downloader infections moving via Facebook Messenger spam, with some victims being infected with Locky ransomware. Continue reading Nemucod Infections Spreading Locky Over Facebook
A phishing campaign is targeting some of the 22 million victims of the massive United States Office of Personnel Management breaches of 2014 and 2015. Continue reading Locky Targets OPM Breach Victims
One of the golden rules of computer security for the last twenty-or-so years has been to be extremely cautious of unsolicited emails. Yet, the same old tricks are still being used to successfully spread ransomware.
Read more in my article on the Hot f… Continue reading Locky ransomware disguises itself as account suspensions and suspicious movements
In a deep analysis of RIG, Cisco Talos team outlined the way the exploit kit combines different web technologies such as DoSWF, JavaScript, Flash and VBscript to obfuscate attacks. Continue reading Inside the RIG Exploit Kit
The next in the never ending series of Locky downloaders is an email with the subject of Your shipment coming as usual from random companies, names and email addresses with a semi-random named zip attachment starting with shipment_ containing a … Continue reading →
The next in the never ending series of Locky downloaders is an email with the subject of Please find attached invoice no: 9233713731 ( random numbers) pretending to come from documenbt at your own email domain with a random named … Continue reading →
Continue reading Please find attached invoice no: 9233713731 malspam delivers Locky