Last week, we debuted our first-ever Mobile Menace Monday post where we talked about a fake Pokémon Go app, which turned…

In March, the website of the Transmission torrent client was hacked, and a maliciously-altered copy of Transmission was uploaded in place…

The website for popular fine Chinese cuisine “Mr Chow” restaurants has been hacked and is redirecting visitors to ransomware. This is not the first…

We have all seen the current popularity and craze with PokemonGo, it’s no surprise cyber-criminals would plan on using this to…

The current cyberthreat landscape is an ever dynamic threat, we have state-sponsored cyberthreats and very sophisticated cybercriminals to defend against. These…

We’ve recently wrote about the leak of keys for Chimera ransomware. In this, more technical post, we will describe how to utilize…

We recently sponsored a deep-dive study conducted by Osterman Research on the subject of Ransomware, and the results are a stark insight…

When ransomware authors compete on the black market, sometimes victims benefit. This time we got access to private keys of the…

We have been tracking a malvertising campaign distributing the Cerber ransomware linked to the actor behind the Magnitude exploit kit for months.It…

So far we dedicated several articles to the interesting, low-level ransomware called Petya, hijacking the boot sector. You can read about…