ransomware

Unsurprisingly, malware incidents set to grow
Up to half of US organizations have experienced malware attacks which have had a severe impact on their business operations, according to new research by IDG Connect. Forty …

Russian ransomware boss earns $90,000 per year
Despite too many users not even being aware of the existence of the ransomware threat, there is no doubt that it’s currently one of the most popular ways for cyber …

Five tips to avoid getting hit by ransomware
Ransomware has emerged as the predominant online security threat to home users and small businesses. Delivered through spam or phishing emails that trick users into clicking …

ZCryptor ransomware spreads via removable drives
The newly spotted ZCryptor ransomware has also the ability to spread like a worm, Microsoft warns. Once it infects a system, it also copies itself on removable drives, in the …

Consumers have no idea what ransomware is
A new study reveals almost half (43%) of connected consumers today do not know what ransomware is, despite the recent aggressive spread of this type of cyber threat. In …

DMA Locker ransomware ready for mass distribution
According to Malwarebytes’ researcher Hasherezade, we’re in for a lot of pain once the new and improved DMA Locker ransomware starts doing the rounds. Its first …

Cybercriminals add DDoS component to ransomware payloads
Instead of just encrypting data files on a workstation (plus any network drive it can find) and locking the machine, a new variant of the Cerber ransomware is now adding a …

Behavior is the new authentication: A look into the future
In the next few years organizations will face extreme IT security challenges. Hackers are targeting humans instead of machines. All the most costly cyber attacks (APTs, …

The end of TeslaCrypt: Master decryption key released
The operators of TeslaCrypt ransomware have decided to close up shop and have published a master key that decrypts the files encrypted by the malware. They also wrote that the …

Tech support scammers start locking Windows computers
Tech support scammers have come up with a new way to trick users into sharing their payment card information: screen lockers showing fake Windows alerts telling users that …

Healthcare under attack! 89% of organizations experienced data breaches
It’s a turbulent time for the healthcare industry: patient data is under siege and hospitals are big targets for cyber attacks, according to the Ponemon Institute. Mistakes …

CryptXXX 2.0 foils decryption tool, locks PCs
CryptXXX ransomware, first spotted in mid-April, has reached version 2.0, and a new level of nastiness. It’s also on its way to become one of the top ransomware families …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility