Security News
LockyDump Utility Created to Aid Locky Infections
The Cisco Talos Security team has created a specialist tool LockyDump which extracts the configuration parameters of Locky infections. ` LockyDump Aids Locky Victims
The Cisco Talos Security team has created a specialist tool LockyDump which extracts the configuration parameters of Locky infections. ` LockyDump Aids Locky Victims
Symantec announced some observations from the past three months. They have monitored a major increase in the number of email-based attacks that use malicious
Locky is one of the most active ransomware viruses on the Internet. Recently, the virus received a new “.odin” extension and started a massive
A new version of the Locky ransomware virus was reported by cyber-security researchers. The new threat uses the .odin file extension for encrypted files.
Email Spam has returned! Well, technically, it never left us, but there was a sharp increase in the level of email spam in the
A new Trojan downloader known by the name of Quant Loader surfaced on the cybercriminal forum scene. The malicious software was up for sale
Ransomware viruses are constantly evolving. The newest “innovation” in the scamming business is the infection by delivering DLL files. Locky and other ransomware viruses
Ransomware campaigns utilizing the potent Locky malware continue to be targeting hospitals worldwide. According to the latest security reports, criminals are attempting to compromise
In our previous publication we introduced how typical ransomware threats operate. And while users may fall victim to different types of infected applications, there
Computer expert Ivan Kwiatkowski infected technical support scammers with the Locky ransomware. The infection was organized in a counterfeit “support session” issued by the