Results for "Teslacrypt"
March 18, 2016 - We take a look at a recent Teslacrypt spam campaign.
December 19, 2015 - Recent Flash exploit is used to drop TeslaCrypt via Angler exploit kit.
April 20, 2015 - TeslaCrypt is branching out into uncharted waters for Ransomware by going after video games and music files. We take a look at whether you should be worried by this new development, and what you can do about it.
April 3, 2019 - We take a look at the various cyberthreats video gamers may encounter online, their real-world consequences, and what users can do to protect themselves.
December 12, 2017 - Although often seen as an illegal cybercriminal tactic, the methodology behind fast flux is actually far from evil. So how is it being abused? Read on to learn more.
July 6, 2017 - As research concluded, the original author of Petya, Janus, was not involved in the latest attacks on Ukraine. As a result of the recent events, Janus released his private key, allowing all the victims of the previous Petya attacks, to get their files back.
March 6, 2017 - In our first wrap-up of the threat landscape, we are going to cover the trends observed during the last few months of 2016, provide an analyst’s view of the threats, and offer some predictions for the beginning of 2017. Moving forward, every quarter we will bring you a view of the threat landscape through the eyes of Malwarebytes researchers and analysts.
November 28, 2016 - A compilation of notable security news and blog posts from the 20th of November to the 26th. This week, we talked about PrincessLocker, ransomware decryptors, malvertising on the Mac, and the Windows Firewall.
July 27, 2016 - Read on to learn how the latest downloaders used to deliver Locky ransomware and show how to statically decipher their hidden URLs.
July 19, 2016 - We have been tracking a malvertising campaign distributing the Cerber ransomware linked to the actor behind the Magnitude exploit kit for months. Despite a global slowdown in exploit kit activity, this particular distribution channel has remained active and strong. In this post we take a look at some past and present indicators of compromise that show how fake identities remain an effective way to defeat ad platforms' security checks.