In our Q1 2017 Tactics and Techniques report, we mentioned that the Locky ransomware had mysteriously vanished. Indeed, for a while, it completely…

The first quarter of 2017 brought with it some significant changes to the threat landscape and we aren’t talking about heavy…

Last week, we gave an overview of what might happen once the bill the US Congress passed in late March takes…

The common conception of cyber attacks is kind of like bad weather: ranging from irritating to catastrophic, but always unpredictable. Hackers…

With the recent proliferation of ransomware, a type of malware that encrypts your data and holds it hostage until payment is…

Do we have blogs for you! Last week, we cracked open a big book of definitions on what packers, crypters, and…

Sage is yet another ransomware that has become a common threat nowadays. Similarly to Spora, it has capabilities to encrypt files…

Exploits: they’re not your mama’s cyberthreats. At one point in the not-so-distant past, exploits were responsible for delivering 80 percent of…

Last week, we investigated Twitter app scammers using stolen celebrity nudes as bait, explored the world of Chinese PUPs and backdoors, took…

In this article, we will try to explain the terms packer, crypter, and protector in the context of how they are…