Results for 'locky'

Exploits and vulnerabilities | News

A look into Neutrino EK’s jQueryGate

August 3, 2016 - In the cybercrime landscape, Exploit Kits (EKs) are the tool of choice to infect endpoints by exploiting software vulnerabilities. However, a...

CONTINUE READING
News

A week in security (Jul 24 – Jul 30)

August 1, 2016 - Last week, we talked about a donation 419 scam, gave an overview of what an APT is, counted the ways one...

CONTINUE READING
News

A week in security (Jul 10 – Jul 16)

July 18, 2016 - Last week, we talked about bug poaching, revealed a novelty Pokemon GO scam bait, profiled a new Mac malware called Keydnap,...

CONTINUE READING
Cybercrime | News

Neutrino EK picks up momentum in recent attacks

July 15, 2016 - While overall exploit kit activity has been somewhat low during the past weeks, we have noted some changes in Neutrino, the leading...

CONTINUE READING
News

A week in security (Jul 03 – Jul 09)

July 11, 2016 - Last week, we discussed about another 419 scam, itemized 12 steps for secure online banking, differentiated two “intentional security holes”, spotlighted...

CONTINUE READING
Cybercrime | News

Ransomware dominates the threat landscape

June 7, 2016 - Ransomware! Ransom Software! Encrypting Ransomware! AHHH! No doubt the last year exposed you to this term numerous times and I doubt...

CONTINUE READING
News

A Week in Security (Mar 13 – Mar 19)

March 21, 2016 - Last week, we touched on a 419 scam, modding on games (in general), a much talked about iCloud scam that “may...

CONTINUE READING
News | Threats

Teslacrypt Spam Campaign: “Unpaid Issue…”

March 18, 2016 - We have all seen the current upsurge in Ransomware attacks. It has been covered on an international scale, with new variants...

CONTINUE READING
News

A Week in Security (Feb 28 – Mar 05)

March 7, 2016 - Last week, we touched on a Facebook video spam, a fake Google Docs phishing site, and a technical yet comprehensive (at...

CONTINUE READING