WastedLocker: Dealing with the Threat Created by Evil Corp
Evil Corp, the Hackers Behind WastedLocker ransomware are making extravagant ransom demands in…
How to Deal With the TTZA Ransomware Infection?
TTZA Ransomware Joins the STOP/Djvu Ransomware Family TTZA Ransomware is another malware…
Hackers Increasingly Demand Ransom in Cryptocurrency
Cybercriminals, and criminals in general, always seek to cover their tracks to…
EvilQuest – a ransomware targeting Mac users through macOS pirated apps
EvilQuest, aka ThiefQuest, has been targeting Mac users and spreading through pirated…
The ransomware-delivering Phorpiex botnet resurfaces on malspam campaigns
An alert from researchers at Check Point details how hackers use the…
AgeLocker ransomware uses Google’s ‘Age’ encryption tool to encrypt victims’ files
A ransomware named AgeLocker utilizes the 'Age' encryption tool created by a…
Expired Domains Can Redirect you to Malicious Websites loaded with Ransomware?
We've all at one time attempted to open a website only to…
Is Conti ransomware the successor to the infamous Ryuk ransomware?
Conti ransomware is a threat that targets corporate networks with features that…
Data Leak Websites and Major Ransomware Groups: A Brief History
Unfortunately, for the victims of cybercrime, larger ransomware gangs have gotten into…
The Ethics of Ransomware Reporting? Why are companies risking potential penalties from the Securities and Exchange Commission in an effort to hide cyberattacks?
Why are companies risking potential penalties from the Securities and Exchange Commission…