Zeljka Zorz
Linux Encoder victims catch a lucky break: a flaw in the malware means no ransom has to be paid
The recently spotted Linux Encoder crypto-ransomware is very disruptive, but the good news is that the malware makers have made a mistake that allowed Bitdefender researchers …
UK parliament’s secure network hit with crypto-ransomware
The UK parliament’s secure network has been breached and several computers on it have been compromised by hackers, The Times has reported. The newspaper makes is sound …
Beware of Apple-themed phishing emails threatening to limit your account
A new email phishing campaign is targeting businesses and consumers who have Apple IDs, trying to get them to enter their Apple login credentials, personal and credit card …
New crypto-ransomware targets Linux web servers
There’s a new piece of crypto-ransomware out there, but unlike most malware of this particular type, this one is mainly directed at web servers running on Linux.The …
The Economist urges readers to check it they were saddled with malware
Popular UK-based news outfit The Economist – or rather, some of its online readers – have become the latest confirmed victims of an attack executed by hacking …
Final TalkTalk breach tally: 4% of customers affected
TalkTalk continues with its practice of updating the public with information regarding the recent data breach on Fridays, and according to the latest update, the total number …
Cheap OmniRAT malware used to spy on Android, Windows, Linux, Mac devices
European law enforcement agencies recently targeted users of the DroidJack mobile phone RAT, and likely made other would-be users refrain from buying and using that particular …
Crypto e-mail provider ProtonMail pays ransom to stop DDoS attack, attack continues
Switzerland-based end-to-end encrypted e-mail provider ProtonMail has been on the receiving end of a heavy DDoS attack since Tuesday, November 3, and unavailable to its users …
A new, streamlined version of Cryptowall is doing rounds
Cryptowall 4 (although the number is not mentioned in the new, changed ransom note) is not drastically different from version 3. According to malware researcher Nathan Scott, …
Sale of legitimate code-signing certs booms on darknet markets
In the underground cybercrime economy, many players have specialized in one or two skills and services. It should come as no surprise, then, that some have become experts at …
Trojanized versions of 20,000 popular apps found secretly rooting Android devices
Lookout researchers have discovered some 20,000 apps that secretly root users’ phone and install themselves as system applications, which makes them able to access …
Crypto-ransomware encrypts files “offline”
Ransomware comes in various forms, and not all ransomware encrypts files – some just block computers until the ransom is paid. When the file encryption feature is …
Featured news
Sponsored
Don't miss
- The effect of compliance requirements on vulnerability management strategies
- Modernizing incident response in the AI era
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader