Security Experts:

long dotted


A ransomware attack on November 25 forced the San Francisco Municipal Transport Authority (SFMTA, or 'Muni') to close ticketing machines and open the gates to its railway system and let riders in for free. [Read More]
The cybercriminals behind the notorious Cerber ransomware family have released three new versions of the malware this week, with the most notable change being the addition of new IP ranges in Cerber 5.0. [Read More]
TeleCrypt, the file encryption ransomware that abuses Telegram API for communication, has had its encryption cracked just two weeks after the threat was originally detailed. [Read More]
Organizations in the healthcare sector continue to be the main targets of the Gatak Trojan, a piece of malware that can steal information and perform backdoor functions. [Read More]
Distributed via spam emails pretending to be complaints from an Internet Service Provider (ISP), a newly observed Locky ransomware variant appends the .AESIR extension to the encrypted files, security researchers reveal. [Read More]
A recent business survey shows that ransomware is no longer just about extorting money; and paying any ransomware is unlikely to guarantee resolution. [Read More]
A newly observed piece of ransomware isn’t targeting files to encrypt, as most threats in this category do, but rather targets local files and social media profiles to encourage them to pay the ransom. [Read More]
The developers of the Apocalypse ransomware have contacted a security researcher to ask for help after discovering that a coding bug was haunting their creation. [Read More]
CryptoLuck ransomware was spotted for the first time recently is already being distributed via an exploit kit (EK). [Read More]
The master decryption keys for the CrySiS ransomware were released on Monday, allowing security researchers to help victims recover their files. [Read More]


rss icon

Ashley Arbuckle's picture
With good security hygiene and a few basic measures you’ll be able to more effectively block, contain, and negate the impact of ransomware.
Wade Williamson's picture
There are computers within our computers that are largely beyond the scope of security, yet control everything we think we know about the device.
Erin O’Malley's picture
Hackers are humans, too, and most humans tend to veer toward the path of least resistance. So why wouldn’t they choose an easy—and lucrative—target like a hospital?
Alastair Paterson's picture
Cyber situational awareness can give you greater insights into the tools and processes used by actors that employ DDoS-based extortion and compromised data release extortion.
David Holmes's picture
A cyber espionage attack against Swiss defense firm RUAG was carried out by the Russia-linked hackers according to a report commissioned by the Swiss government.
Wade Williamson's picture
Behavioral detection models can focus in on what the attacker actually does, instead of relying on a set of signatures or known indicators of compromise that often lag behind attackers.
Jack Danahy's picture
Typical lockdown or encryption of a system happens within a minute or two of the ransomware’s execution. At that point, there are only two choices left: pay or start cleaning up.
Torsten George's picture
What do enterprises need to know about ransomware attacks and what can they do to minimize the risk of being victimized?
Jennifer Blatnik's picture
It is critical for business leadership to address the growing threat of ransomware as a business risk rather than a siloed IT issue.
Wade Williamson's picture
The evolution of ransomware from simple malware to more persistent attacks has a major impact on the way enterprise security teams have to think about mitigation.