Malware authors find easy to develop malware using the Microsoft .Net framework, some infamous ransomware like SamSam, Lime and now Shrug2 ransomware...
The new version of Princess Locker ransomware dubbed Princess Evolution advertised in dark web forums as a ransomware as a service (RaaS) and...
Cybersecurity experts have come up with the warning that Iranian Hackers, in the face of the economic issues that the country is...
Factories crippled after WannaCry variant infected Windows 7 devices without protection Enterprise network security specialists from the International Institute of Cyber Security...
Electromagnetic pulse (EMP) attacks can render our advanced technology to recede as back to pre-industrial revolution stage. In other words, we in...
Threat actors behind AZORult malware released an updated version with improvements on both the stealer and the downloader functionalities. Within a day...
Cyber Criminals distributing Hermes Ransomware via dangerous malspam that contains Weaponized Password protected Word documents to encrypt the system files and lock the victim’s...
In this new digital landscape, IT security professionals are feeling the most heat, as they must constantly fret about looming cyberattacks and...
WannaCry ransomware hero is facing charges in the United States for developing Kronos banking trojan. In August 2017, Marcus Hutchins (@MalwareTechBlog on Twitter) aka...
In today’s ever-changing technological landscape, cybercriminals have taken on the challenge of cybersecurity. Different forms of ransomware and crytojacking malware are their...
Ransomware attack hits computer systems of Navi Mumbai Mahatma Gandhi Mission Hospital. The attack came into light on Sunday when a receptionist...
Ransomware seems to have taken a back seat and not it’s Cryptojacking the latest arsenal for cybercriminals, and it has increased drastically over...
This is a reflection exercise on the possible evolution of one of the most common information threats nowadays. Are ransomware threats the...
Magniber ransomware emerges again leveraging various obfuscation techniques and with refined source codes. The most famous and long-running browser exploitation toolkit Magnitude...
GandCrab ransomware, which has created a hullabaloo in the cybersecurity industry by constantly evolving, has yet again caused a commotion. The latest...
The new version of GandCrab ransomware discovered that attack the target system using SMB exploit spreader through compromised websites that posed as...
A newly discovered malicious PDF sample distributing Rakhni ransomware family and hackers now added new crypto-mining capabilities to infect victims to perform both...
Pentest specialists discovered a malware piece that infects systems with ransomware cryptocurrency mining programs, depending on equipment specifications and configuration, to decide which...
Antimalware companies have made many innovations for many decades in order to keep individuals and enterprises secure from cyber risks. However, human...
Endpoint security is of critical importance to all kinds of organizations, big and small. As organizations all around the world get attacked...
Industry research supports the belief that cybercriminals are currently developing many new ways to boost their attack capabilities, on the network and...