Results for 'locky'
VideoBytes: Ransomware gets wasted!
October 2, 2020 - Hello dear readers, and welcome to the latest edition of VideoBytes! On today’s episode, we’re talking about how ransomware is on...
An in-depth malware analysis of QuantLoader
March 28, 2018 - This guest post is written by Vishal Thakur, CSIRT/Salesforce. For more on Vishal, read his bio at the end of the...
Hermes ransomware distributed to South Koreans via recent Flash zero-day
March 14, 2018 - This blog post was authored by @hasherezade, Jérôme Segura and Vasilios Hioureas. At the end of January, the South Korean Emergency...
Free tools: Internet traffic monitoring
December 14, 2017 - Are you an amateur analyst or security enthusiast looking for free tools to do some basic Internet traffic monitoring? You’ve come...
A week in security (October 16 – October 22)
October 23, 2017 - Last week was an eventful one in security, keeping our research and intel teams on their toes. Multiple security researchers homed...
Elaborate scripting-fu used in espionage attack against Saudi Arabia Government entity
September 26, 2017 - We recently came across a campaign targeting a Saudi Arabia Government entity via a malicious Word document which at first reminded...
A week in security (September 4 – September 10)
September 11, 2017 - Last week, we looked into expired domain names being used for malvertising, delved into dubious Facebook apps, and checked out Chinese...
A week in security (August 28 – September 3)
September 4, 2017 - Last week, we looked at what actions Kronos can perform in the final installment of a 2-part post. We also dived...
Malware vaccination tricks: blue pills or red pills
August 30, 2017 - First, let me explain what I mean by malware vaccination tricks. Most of you will have heard about some of these....
A week in security (August 14 – August 20)
August 21, 2017 - Last week, we gave some security tips for parents and kids aimed at the new school term. We also took a...