Results for "Teslacrypt"

March 18, 2016 - We take a look at a recent Teslacrypt spam campaign.

CONTINUE READING No Comments

December 19, 2015 - Recent Flash exploit is used to drop TeslaCrypt via Angler exploit kit.

CONTINUE READING 2 Comments

April 20, 2015 - TeslaCrypt is branching out into uncharted waters for Ransomware by going after video games and music files. We take a look at whether you should be worried by this new development, and what you can do about it.

CONTINUE READING 13 Comments

April 3, 2019 - We take a look at the various cyberthreats video gamers may encounter online, their real-world consequences, and what users can do to protect themselves.

CONTINUE READING No Comments

December 12, 2017 - Although often seen as an illegal cybercriminal tactic, the methodology behind fast flux is actually far from evil. So how is it being abused? Read on to learn more.

CONTINUE READING No Comments

July 6, 2017 - As research concluded, the original author of Petya, Janus, was not involved in the latest attacks on Ukraine. As a result of the recent events, Janus released his private key, allowing all the victims of the previous Petya attacks, to get their files back.

CONTINUE READING 13 Comments

March 6, 2017 - In our first wrap-up of the threat landscape, we are going to cover the trends observed during the last few months of 2016, provide an analyst’s view of the threats, and offer some predictions for the beginning of 2017. Moving forward, every quarter we will bring you a view of the threat landscape through the eyes of Malwarebytes researchers and analysts.

CONTINUE READING 2 Comments

November 28, 2016 - A compilation of notable security news and blog posts from the 20th of November to the 26th. This week, we talked about PrincessLocker, ransomware decryptors, malvertising on the Mac, and the Windows Firewall.

CONTINUE READING No Comments

July 27, 2016 - Read on to learn how the latest downloaders used to deliver Locky ransomware and show how to statically decipher their hidden URLs.

CONTINUE READING 3 Comments

July 19, 2016 - We have been tracking a malvertising campaign distributing the Cerber ransomware linked to the actor behind the Magnitude exploit kit for months. Despite a global slowdown in exploit kit activity, this particular distribution channel has remained active and strong. In this post we take a look at some past and present indicators of compromise that show how fake identities remain an effective way to defeat ad platforms' security checks.

CONTINUE READING No Comments

Select your language