Post-COVID-19 Ransomware Threats
As telecommuters begin to return to an office setting post-COVID-19, experts are predicting a spike in new ransomware campaigns When…
An Overview of the Most Common Practices Employed by Ransomware
Four common ways ransomware can infect your organization, including Angler and Nuclear exploit kits and Locky and CryptoWall ransomware Understanding…
STOP and Zorab Ransomware: An Overview
Ransomware strains STOP and Zorab are exploiting the desperation of victims with a fake decryptor that double encrypts victims' files…
WastedLocker: Dealing with the Threat Created by Evil Corp
Evil Corp, the Hackers Behind WastedLocker ransomware are making extravagant ransom demands in the millions of dollars, despite facing criminal charges…
How to Deal With the TTZA Ransomware Infection?
TTZA Ransomware Joins the STOP/Djvu Ransomware Family TTZA Ransomware is another malware strain that is a part of the prolific…
Hackers Increasingly Demand Ransom in Cryptocurrency
Cybercriminals, and criminals in general, always seek to cover their tracks to avoid prosecution. With that in mind, many hackers…
EvilQuest – a ransomware targeting Mac users through macOS pirated apps
EvilQuest, aka ThiefQuest, has been targeting Mac users and spreading through pirated versions of popular macOS software such as Little…
The ransomware-delivering Phorpiex botnet resurfaces on malspam campaigns
An alert from researchers at Check Point details how hackers use the ransomware-delivering Phorpiex botnet to initiate email-based malspam campaigns…
AgeLocker ransomware uses Google’s ‘Age’ encryption tool to encrypt victims’ files
A ransomware named AgeLocker utilizes the 'Age' encryption tool created by a Google-employed developer to encrypt victim's files. After a close…
Expired Domains Can Redirect you to Malicious Websites loaded with Ransomware?
We've all at one time attempted to open a website only to discover that the site is no longer active…