The Latest in IT Security

1

This year we found a new family of ransomware used in targeted attacks against organizations. After penetrating an organization’s network the threat actors used the PsExec tool to install ransomware on all endpoints and servers in the organization.

Read more ...

1

The Hancitor downloader has surged into the top five most wanted malware families worldwide for the first time, according to Check Point.

Read more ...

1

Matthew Green and students speculate on what truly well-designed ransomware system could look like: Most modern ransomware employs a cryptocurrency like Bitcoin to enable the payments that make the ransom possible. This is perhaps not the strongest argument for systems like Bitcoin — and yet it seems unlikely that Bitcoin is going away anytime soon. […]

Read more ...

1

Just to show you that behind some PUPs there are threat actors that are too lazy to be bothered, we offer you a fake online scanner that was used to promote the infamous MacKeeper and a Windows system optimizer called Advance-System-Care. The redirect scheme on a Windows machine looked like this. From a compromised website […]

Read more ...

Categories

MONDAY, MARCH 27, 2017

Featured

Archives

Latest Comments

Social Networks