rivitMedia Archive: Online Scams During Lockdown
The enduring COVID-19 lockdown, the rise in telecommuting and new scams continue to provide a wide net for hackers looking…
AnarchyGrabber3: Detection and Removal Guide
Gamers Beware: Hackers are using malware to steal your passwords on the popular gaming communication app Discord password and attack…
Post-COVID-19 Ransomware Threats
As telecommuters begin to return to an office setting post-COVID-19, experts are predicting a spike in new ransomware campaigns When…
An Overview of the Most Common Practices Employed by Ransomware
Four common ways ransomware can infect your organization, including Angler and Nuclear exploit kits and Locky and CryptoWall ransomware Understanding…
Urnsif Malware: What is it and how to Deal with it?
Security researchers have discovered a new Ursnif malware delivery campaign that leverages Excel 4.0 macro functionality In an analysis of…
STOP and Zorab Ransomware: An Overview
Ransomware strains STOP and Zorab are exploiting the desperation of victims with a fake decryptor that double encrypts victims' files…
rivitMedia Archives: An Overview of 2020’s FBI Cybercrime Complaint Center
The FBI’s Internet Crime Complaint Center or IC3 received over 20,000 coronavirus-related cyber threat reports in 2020 In June of…
WastedLocker: Dealing with the Threat Created by Evil Corp
Evil Corp, the Hackers Behind WastedLocker ransomware are making extravagant ransom demands in the millions of dollars, despite facing criminal charges…
Keeping Your System Safe from the ‘Lucifer Malware’
Evil Lucifer Malware targets Windows systems with cryptojacking and distributed denial-of-service (DDoS) attacks A downright devilish self-propagating new malware known…
A Brief History of CryptoJacking
Crypto-jacking, also known as Browser-based cryptocurrency mining, has made a surprising comeback in 2020. According to Symantec's Threat Landscape Trends…