Archive for the ‘ransomware’ Category
If your computer has been infected with PyLocky Ransomware and you are searching for a free ransomware decryption tool to unlock or decrypt your files—your search might end here.
Security researcher Mike Bautista at Cisco's Talos cyber intelligence unit have released a free decryption tool that makes it possible for victims infected with the PyLocky ransomware to unlock their encrypted files
Posted in file encryption, hacking news, Locky ransomware, PyLocky, PyLocky ransomware, ransomware, ransomware decrypt tool, Ransomware Decryption software, ransomware malware, unlock files | Comments (0)
"Pay $20,000 worth of bitcoin, or a bomb will detonate in your building"
A massive number of businesses, schools, government offices and individuals across the US, New Zealand and Canada on Thursday received bomb threats via emails that caused nationwide chaos, forcing widespread evacuations and police response.
The bomb threat emails were apparently sent by spammers, threatening people that
Posted in bomb threat, cyber security, Cyber threats, email scam, email spam, Email spoofing, hoax bomb threat, ransom money, ransomware | Comments (0)
A new piece of ransomware is spreading rapidly across China that has already infected more than 100,000 computers in the last four days as a result of a supply-chain attack... and the number of infected users is continuously increasing every hour.
What's Interesting? Unlike almost every ransomware malware, the new virus doesn't demand ransom payments in Bitcoin.
Instead, the attacker is
Posted in Chinese Hackers, computer virus, malware, Malware attack, password stealer, ransomware, ransomware attack, ransomware malware, Wechat | Comments (0)
The Department of Justice announced Wednesday charges against two Iranian nationals for their involvement in creating and deploying the notorious SamSam ransomware.
The alleged hackers, Faramarz Shahi Savandi, 34, and Mohammad Mehdi Shah, 27, have been charged on several counts of computer hacking and fraud charges, the indictment unsealed today at New Jersey court revealed.
The duo used
Posted in Cyber Attack, Cyber Criminal, file encryption software, hacker arrested, hacking news, Iranian Hackers, malware, Malware attack, ransomware, ransomware attack, Samsam Ransomware | Comments (0)
One of the most devastating aspects of the recent WannaCry ransomware attack was its self-propagating capability exploiting a vulnerability in the file access protocol, SMB v1.
Most enterprises defences are externally-facing, focused on stopping incoming email and web attacks. But, once attackers gain a foothold inside the network through malware, there are very few security controls that
Posted in Cato Networks, firewall, intrusion prevention system, network security, Network Security Services, network security tool, ransomware, smb vulnerability, WannaCryptor | Comments (0)
Ukrainian authorities have arrested a 51-year-old man accused of distributing the infamous Petya ransomware (Petya.A, also known as NotPetya) — the same computer virus that massively hit numerous businesses, organisations and banks in Ukraine as well as different parts of Europe around 45 days ago.
However, the story is not as simple as it seems, which portrayed this man as a criminal. I
Posted in computer virus, Cyber Attack, Cyber Crime, hacker arrested, hacking news, NotPetya ransomware, Petya ransomware, ransomware, ransomware attack, ransomware malware, video blogger, WannaCry Ransomware | Comments (0)
Bad news for Android users — Decompiled source code of for one of the oldest mobile and popular Android ransomware families has been published online, making it available for cyber criminals who can use it to develop more customised and advanced variants of Android ransomware.
Decompiled source code for the SLocker android ransomware, which saw a six-fold increase in the number of new
Posted in android ransomware, ransomware, ransomware download, SLocker Ransomware, source code | Comments (0)
Nothing in this world is fully secure, from our borders to cyberspace. I know vulnerabilities are bad, but the worst part comes in when people just don’t care to apply patches on time.
Late last year, Cisco’s Talos intelligence and research group discovered three critical remote code execution (RCE) vulnerabilities in Memcached that exposed major websites including Facebook, Twitter, YouTube,
Posted in cache server, database hacking, hacking database, memcached, MongoDB database, patch update, php website, ransomware, remote code execution, secure mongodb, server hacking, Vulnerability, website security | Comments (0)