2 min read - Concealed C&C servers make it even more difficult for researchers to track down data dumps and stolen information repositories.
4 min read - Many cybercriminals have turned to ransomware as a cheaper, simpler alternative to traditional methods of stealing medical records.
2 min read - A recent study revealed that ransomware victims around the globe are significantly more likely to pay attackers than victims in the U.S.
2 min read - The developers of the Petya and Mischa ransomware packages have embraced a new business model: ransomware-as-a-service (RaaS).
2 min read - The new version of the Petya ransomware features the proper implementation of Salsa20 as well as a more complex preprocessing algorithm.
2 min read - A new proof of concept (PoC) for a previously patched Internet Explorer vulnerability has made its way into the Neutrino exploit kit.
2 min read - The popularity of threats such as the CryptoLocker ransomware highlights some security best practices that can help enterprises avoid attacks.
2 min read - A new security tool called CryptoDrop aims to flag malicious encryption processes to stop a ransomware infection from being completed.
2 min read - Zepto is a new ransomware that's following in Locky's footsteps, but it is adding a large dose of fear as it wreaks havoc on users.
2 min read - Just a few weeks after the Necurs botnet was shut down for an unknown reason, the threat has made a comeback and is back in operation.
Analysis and insights from hundreds of the brightest minds in the cybersecurity industry to help you prove compliance, grow business and stop threats.