Results for 'locky'
A look into Neutrino EK’s jQueryGate
August 3, 2016 - In the cybercrime landscape, Exploit Kits (EKs) are the tool of choice to infect endpoints by exploiting software vulnerabilities. However, a...
A week in security (Jul 24 – Jul 30)
August 1, 2016 - Last week, we talked about a donation 419 scam, gave an overview of what an APT is, counted the ways one...
A week in security (Jul 10 – Jul 16)
July 18, 2016 - Last week, we talked about bug poaching, revealed a novelty Pokemon GO scam bait, profiled a new Mac malware called Keydnap,...
Neutrino EK picks up momentum in recent attacks
July 15, 2016 - While overall exploit kit activity has been somewhat low during the past weeks, we have noted some changes in Neutrino, the leading...
A week in security (Jul 03 – Jul 09)
July 11, 2016 - Last week, we discussed about another 419 scam, itemized 12 steps for secure online banking, differentiated two “intentional security holes”, spotlighted...
Ransomware dominates the threat landscape
June 7, 2016 - Ransomware! Ransom Software! Encrypting Ransomware! AHHH! No doubt the last year exposed you to this term numerous times and I doubt...
A Week in Security (Mar 13 – Mar 19)
March 21, 2016 - Last week, we touched on a 419 scam, modding on games (in general), a much talked about iCloud scam that “may...
Teslacrypt Spam Campaign: “Unpaid Issue…”
March 18, 2016 - We have all seen the current upsurge in Ransomware attacks. It has been covered on an international scale, with new variants...
A Week in Security (Feb 28 – Mar 05)
March 7, 2016 - Last week, we touched on a Facebook video spam, a fake Google Docs phishing site, and a technical yet comprehensive (at...