Prospective on the evolution of ransomware
This is a reflection exercise on the possible evolution of one of the most common information threats nowadays. Are ransomware threats the big deal that media claim? Ransomware is a malwareRead More →
This is a reflection exercise on the possible evolution of one of the most common information threats nowadays. Are ransomware threats the big deal that media claim? Ransomware is a malwareRead More →
Pentest specialists discovered a malware piece that infects systems with ransomware cryptocurrency mining programs, depending on equipment specifications and configuration, to decide which of the two attacks could be more profitable.Read More →
The Process Doppelgänging technique was first presented in December 2017 at the BlackHat conference. Since the presentation several threat actors have started using this sophisticated technique in an attempt to bypass modernRead More →
Information security experts at CSE CybSec ZLab malware Lab have conducted an analysis of the principal Ransomware-as-a-Service platforms available on the dark web. Whit the pass of time, the diffusionRead More →
The authors of the XiaoBa ransomware have retooled their malware’s code into a cryptocurrency miner (coinminer). According to information security experts, despite not encrypting files anymore, the XiaoBa coinminer stillRead More →
This article, it’s an insight into the ransomware business and how it operates, with data gathered over a period of two years. Moreover, since ransomware largely transacts using Bitcoin, theRead More →
The njRAT, also famed as Bladabindi, has been upgraded to push Lime Ransomware and a Bitcoin wallet stealer. According to a Zscaler blog post, this trojan was first spotted inRead More →
Researchers found they were able to infect robots with ransomware; in the real world such attacks could be highly damaging to businesses if robotic security isn’t addressed. According to information securityRead More →
Ransomware is one of the most important threats facing Internet users. Its rate alerts much to both companies and users. Hackers take advantage of the most popular sectors and whereRead More →
SamSam ransomware in January infected vulnerable networks in hospitals, city councils, educational facilities and transportation systems. Now SamSam ransomware is back and the Colorado Department of Transportation is its mostRead More →