MySQL instances attacked by database blackmailers
Copycats delete databases without dumping them first. Internet-facing instances of the popular MySQL information store are being targeted by attackers following similar attacks on ...
Keeping you updated on the latest ransomware attack vectors, strains, decryptors, families and trends to help you avoid becoming infected.
Copycats delete databases without dumping them first. Internet-facing instances of the popular MySQL information store are being targeted by attackers following similar attacks on ...
BLACKFOOT — Bingham County officials are scrambling to rebuild parts of their computer infrastructure after a ransomware attack took down county servers on Wednesday. The Bingham County ...
Our friend Larry Abrams at Bleepingcomputer alerted the world about a new strain of ransomware called DynA-Crypt that was put together using a malware creation kit by people that are not ...
Remember the CRYSIS ransomware? The attacks started up again, mostly targeting US healthcare orgs. using brute force attacks via Remote Desktop Protocol (RDP). The number of attacks has ...
Kaspersky warned on their blog: "People are downloading a new app, looking to get free access to Netflix accounts. What they’re actually getting is a malware strain called Netix that ...
More than 1,000 government computer systems shut down. A county in Ohio, US, has had to shut down its entire IT infrastructure due to a ransomware infection. County Auditor Mike Smith ...
The number of ransomware attacks quadrupled in 2016 and are expected to double again in 2017, according to findings in a report from large insurer Beazley. They suggested that ...
The Police Department in Cockrell Hill, Texas released in a press release that they lost 8 years worth of evidence after the department's server was infected with ransomware.
The new Spora ransomware strain has now been dissected by more malware researchers and the team from G Data discovered that Spora uses an "innovative" way to spread itself via USB sticks. ...
Emsisoft researchers dissected a new ransomware strain that demands users not only pay to recover their encrypted files, but also for immunity from future attacks. The threat is called ...
You now really have 300+ new ways to make sure your users Think Before They Click!
Did I get your attention? The picture here raised my eyebrows, because of its patent nonsense. Elizabeth Holmes stated this in an interview about being an entrepreneur. It's a bit like ...
Jan Sirmer at the Avast blog wrote: "Based on analysis of past Locky ransomware attacks, experts in the Avast Threat Labs predict that another attack is imminent. Locky has taken a ...
Healthcare records of an Arizona clinic have not been available for months after a ransomware infection. The Desert Care clinic got infected in August, and they were not able to recover ...
Talk about adding insult to injury with this new KillDisk version. Here is how social engineering can cost you dearly. The Sandworm cybercrime gang has upped its game. They were initially ...
Confidential health data or personal information of more than 750,000 people may have been accessed in a cyberattack on Los Angeles County employees in May that led to charges this week ...
My Interview at CSO About Ransomware-as-a-Service Joan Goodchild, Editor-in-chief at CSO sat me down and asked why Ransomware-as-a-Service has taken off recently: "It’s not just your ...
A rather mind-blowing 70% of businesses hit by ransomware paid the hackers to regain access to hijacked systems and files, according to a new IBM X-Force Ransomware report. Of the ...
Sophos reported on one of the more scary ransomware strains I have seen lately. It's called Goldeneye and encrypts the workstation twice: both the files and the Master File Table (MFT). ...
A couple of weeks ago, a yet unknown attacker hacked the computer systems of the San Francisco’s Municipal railway causing a free ride for all that Saturday. The ransomware hacker was ...