Encryption 101: Decryptor’s thought process

In this part of the encryption 101 series, we will begin wrapping it up by going into detail on a ransomware with weak encryption and walking through step-by-step the thought process of creating a decryptor for it.

Read more

Bye, bye Petya! Decryptor for old versions released.

This post shows you how to use the special decryptor for the petya family: Petya, Msicha, and Goldeneye. Not suitable for copycats of these.

Read more

A stolen version of DMA Locker is making the rounds

Pirated versions of DMA-locker are doing the rounds, but there is some good news. All the encrypted data can be decrypted with the same key and we can give it to you.

Read more

WannaDecrypt your files? The WannaCry solution, for some

A decryptor (Wanakiwi) that has been developed for WannaCry/WannaCrypt/wCrypt. There is a catch though, it only works for some operating systems.

Read more

From a fake wallet to a Java RAT

We take a look at Adwind, one of the most popular Java Remote Administration Tool. This RAT was distributed via a phishing email and amongst other things, can steal credentials or capture screenshots on the infected machine.

Read more

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language