CTB-Locker with New, Improved Version
An improved version of Onion ransomware has just emerged. No matter if you call it Onion or CTB-Locker, this is […]
CTB-Locker with New, Improved Version Read More »
An improved version of Onion ransomware has just emerged. No matter if you call it Onion or CTB-Locker, this is […]
CTB-Locker with New, Improved Version Read More »
Security researchers reported that a new ransomware has been using pen-testing/attack tools for a more targeted approach of getting installed
Samas Ransomware Infecting Whole Networks Read More »
A brand new version of TeslaCrypt 4.0 has just been released. The latest of the ransomware version was noticed by
TeslaCrypt 4.0 With Bug Fixes, Decryption Impossible Read More »
According to security experts, most of the ransomware attacks are deployed through exploits, booby-trapped email attachments, or Microsoft Office loopholes,
Hackers Spread Ransomware Via TeamViewer Read More »
Decryption keys for the malware was released by the software developer whose example encryption code was used by a strain
Unnamed Ransomware Uses Backdoored Crypto API, Unlock Keys Available Read More »
A newly-found flaw in the Radamant command and control (C&C) server has allowed security experts to trick the malware into
Radamant C&C Server Flaw Allows Free File Decryption Read More »
Hacking operations depend on various factors. When it comes to the Suckfly gang, one of the key factors for such
Malware Gang Steals Certificates To Bypass Code-Signing Checks Read More »
Security expert from Kaspersky, Santiago Pontiroli, has just uncovered an account-stealing malware which sells for as little as £20 on
‘Steam Stealer’ Suspected Of Hijacking 77K Accounts Monthly Read More »
Security researchers have discovered an advertising campaign which has been placing malicious advertisements on very popular websites both in the
Malvertisers Plant Angler Exploit Kit on Popular Sites Read More »
Last week, a tsunami of spam emails in Australia, Japan, Europe, and North America has been reported. Next week it’s
Nemucod Trojan Spreads Ransomware via Emails Read More »
Security researchers claim that cyber criminals who use tactics and tools previously associated with Chinese government-supported computer network intrusions have
Report: Chinese Hackers Behind US Ransomware Attacks Read More »
A while ago, security experts found out a new kink in the tactics of cyber criminals. In order to deliver
Fileless Malware Spread via Word Documents And Windows PowerShell Read More »
This week, Ottawa Hospital reported that its computer network was infected with ransomware. Four of the hospital’s 9,800 virtual machines
Ottawa Hospital Under Ransomware Attack Read More »
The so called Android Marcher Trojan has been using pornographic websites to make users download a malicious file, disguised as
Adult Websites Spread Android Banking Trojan Read More »
Bitstamp, the Slovenian Bitcoin exchange portal, is warning Google Chrome users that an extension is stealing their Bitcoin when making
Malicious Chrome Extension Steals Users’ Bitcoins Read More »