A decryptor has been released by ransomware expert BloodDolly that will allow victim’s encrypted by the ODCODC Ransomware to recover their files...
Australia is being hit hard by ransomware attacks and we’ve heard a lot of security vendors advise against paying the ransom that...
Sites exploited by SoakSoak bots give the gift of CryptXXX malware. If you’ve visited the do-it-yourself project site of Dunlop Adhesives, the...
Hackers who want to make money but don’t want to get involved in the messy business of extracting payment from victims have turned...
A lot has been said about the ransomware epidemic. The number of infections worldwide increases daily, as well as the number of...
Hackers are selling Stampado Ransomware on the dark net for just $39 — They claim it’s FUD (fully undetectable)! The Dark Net is full of...
Tagged as “Ranscam”, Powershell and script-based malware is a botched smash-and-grab. There has been a lot of ingenuity poured into creating crypto-ransomware, the...
A new ransomware called CTB-Faker was discovered that pretends to be the CTB-Locker ransomware. It is a poor imitator, though, as instead of...
Decrypter works with older Jigsaw versions as well. Security researchers from Check Point announced over the weekend that they identified a way to...
Security researcher BloodDolly recently discovered a new file encrypter called Alfa Ransomware, or Alpha Ransomware, which is from the developers of Cerber....
The upcoming version of Android introduces a new condition so the “resetPassword” API cannot be used to reset a device’s password. The...
The start of a series This blog entry is the first in a new series featuring reports from Check Point SandBlast Agent...
RansomNoteCleaner Windows app cleans up the ransom note spam left behind after removing a ransomware infection. Security researcher Michael Gillespie, one of...
Talos have observed a large uptick in the Zepto ransomware and have identified a method of distribution for the Zepto ransomware, Spam...
Short Bytes: The Cerber ransomware is here to lock down your important documents and force you to pay ransom in the form of...
As data-encrypting malware proliferates, new entrants search for ways to stand out. The crypto ransomware racket is a booming business thatgenerates lots...
Millions of Office 365 business users likely effected. Starting June 22 at 6:44 a.m. UTC, Avanan’s Cloud Security Platform started to detect a...
The actors behind Dridex 220 and Locky Affid=3 have introduced a new ransomware called “Bart”. They are using the RockLoader malware to...
A new ransomware was discovered that is written in Python and targets theZimbra enterprise collaboration software. Reported by one of our visitors, this...
In an effort to develop a target base and increase the conversion rate of victims, ransomware perpetrators will try to veer away...
How do companies regardless of size and industry prepare for ransomware attacks? A recent study revealed that businesses are considering saving up Bitcoins,...