Ransomware as a distraction
HermeticRansom cryptor was used as a distraction to support HermeticWiper attacks.
217 articles
HermeticRansom cryptor was used as a distraction to support HermeticWiper attacks.
Over the past five years, the Trickbot banking Trojan has evolved into a multifunctional tool for cybercriminals.
The results of AV-TEST’s thorough research on the ability of cybersecurity products to tackle ransomware are shocking and scary.
Testing 11 advanced security solutions against the latest ransomware threats.
Airports have always been an attractive target for cybercrime. Here’s how to keep them protected.
Guard against ransomers who encrypt your files and demand payment for their safe return.
LockBit 2.0 ransomware can spread across a local network through group policies created on a hijacked domain controller.
A ransomware attack forced Ireland’s healthcare service to shut down its servers. Here’s what we know so far.
Should you contact authorities about ransomware?
In the face of high-profile ransomware attacks on healthcare institutions, here’s how to protect your business from the threat.
The most active groups targeting companies, encrypting data, and demanding ransom.
With a website that looks like it could represent an online service provider, DarkSide Leaks makes us wonder what cybercriminals’ other PR tricks might be.
Ransomware, once represented by screen blockers that were almost cute, has come of age.
Ransomware operators sometimes resort to rather unconventional threats to get their victims to pay.
Several cybercriminal groups have exploited vulnerabilities in VMware ESXi to infect computers with ransomware.
Three reasons not to pay cyber-extortionists — and what to do if you get hit.
RTM group attacks victims with ransomware, a banking Trojan, and remote-access tools.
CD Projekt confirms attack on internal systems. Hackers claim to have downloaded Cyberpunk 2077 and The Witcher 3 source code, and demand ransom.
When the creators of Fonix ransomware abandoned their malicious ways and published the master key, we made a decryptor out of it.