Google
Past week
  • Any time
  • Past hour
  • Past 24 hours
  • Past week
  • Past month
  • Past year
All results
19 hours ago · Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom.
5 days ago · Security vendors' analysis. Do you want to automate checks? AhnLab-V3 Trojan/Win32.Petya.R203323. Alibaba Ransom:Win32/Petya.50c. AliCloud RansomWare.
6 days ago · For example, the Petya ransomware initially just checked for the presence of a certain file. By creating a fake version of that file, you could effectively ...
5 days ago · See for yourself with our downloadable ransomware tracker, regularly updated with incidents and attacks by name, location, date, and industry.
7 days ago · This approach not only provides insight into potential systemic vulnerabilities that enhance cascade cyber threats but also enhances an organization's capacity ...
4 days ago · Describes fileless malware and how Microsoft Defender Antivirus uses AMSI to protect against hidden threats.
3 days ago · A supply chain attack is a cyber-attack that seeks to damage an organization by targeting less secure elements in the supply chain.
13 hours ago · This paper aims to survey contributions to the research of en- cryption detection in ransomware and techniques valuable for de- tecting the ransomware ...
5 days ago · Researchers have discovered a new phishing campaign utilizing Microsoft's Word file recovery feature. In this campaign, threat actors exploit the corrupted file ...
6 days ago · This blog highlights the use of emulators, app cloning, and virtual cameras to exploit vulnerabilities, and highlights the financial and societal impacts of ...