The research team at Trend Micro discovered a new variant of Bladabindi, which is a remote access tool.
This trojan malware called Cannon, comes from the hacking group APT28, which has close ties to the Kremlin.
ZDNet reports a new SamSam ransomware campaign targets organizations within the United States. So far, the ransomware attacked 67 companies, with one of these companies being an administer of the upcoming midterm elections.
How Does This SamSam […]
Some malware variants are becoming smarter and harder to stop. Kaspersky Lab discovered a new version of the SynAttack, which uses Process Doppelganging to evade malware tools, according to a report by Dark Reading.
How Does SynAck […]
If hacking into your emails isn’t bad enough, your company’s robotics could go plum loco under robot ransomware.
Security researchers with IOActive discovered vulnerabilities with two different robots. In each instance, the ransomware stopped […]
One of the biggest known ransomware, the CryptoMix family first emerged in May 2016. CryptoMix is a combination of CryptXXX and CryptWall. It is reinvented quite frequently and the new variant of CryptoMix was just in name as […]
The NotPetya Ransomware, Which is a new variant of Petya is widely considered as one of the nastiest malware to ever emerge after it surfaced in June 2017. This malware differs from others especially in its mode of […]
If you’re wondering what a ransomware is, it is any malicious program that holds on to your data using encryption for a ransom. The effects of an attack from such a software or program on your business or […]
The HC6 Ransomware was recently discovered and typically requires victims to pay ransoms of up to $2500 before their files can be decrypted. It is commonly called the .fucku ransomware or virus because it renames files to end […]
The past few decades have brought about technological advancements that only a handful could have predicted. However, no one could have predicted the level of hacker sophistication that exists today and their associated data recovery challenges. Cyberattacks are consistently on […]