US, EU, UK, NATO blame china for “reckless” Exchange attacks

The US, UK, EU, and NATO have have issued a coordinated, public censure of China for its role in attacks against Exchange servers earlier this year.

Read more

Ransomware disrupts food supply chain, Exchange exploitation suspected

The disruption of food logistics company shows how the target isn’t the only victim of a successful ransomware attack.

Read more

A decade in cybersecurity fails: the top breaches, threats, and ‘whoopsies’ of the 2010s

As the 2010s come to a close, we take a snarky walk down memory lane, listing the craziest, most impactful, or simply just awful cybersecurity fails of the decade.

Read more

Compromising vital infrastructure: air traffic control

The aviation industry and air traffic (control) are vital elements of our infrastructure. While flying is reportedly safe, how does that landscape look cybersecurity-wise?

Read more

Compromising vital infrastructure: transport and logistics

Transport and logistics are vital infrastructure, because we need them to deliver our daily necessities, but who is responsible for protecting them?

Read more

BadRabbit: a closer look at the new version of Petya/NotPetya

BadRabbit, a new version of NotPetya, also has an infector allowing for lateral movements. However, unlike NotPetya, it does not use EternalBlue and uses a website to drop its payload. We take a closer look at this new ransomware variant.

Read more

Keeping up with the Petyas: Demystifying the malware family

Last June 27, there was a huge outbreak of a Petya-esque malware with WannaCry-style infector in the Ukraine. Since there is still confusion about how exactly this malware is linked to the original Petya, we have prepared this small guide on the background of the Petya family.

Read more

Report: Second quarter dominated by ransomware outbreaks

The second quarter of 2017 left the security world wondering, “What the hell happened?” With leaks of government-created exploits being deployed against users in the wild, a continued sea of ransomware constantly threatening our ability to work online, and the lines between malware and potentially unwanted programs continuing to blur, every new incident was a wakeup call.In this report, we are going to discuss some of the most important trends, tactics, and attacks of Q2 2017, including an update on ransomware, what is going on with all these exploits, and a special look at all the breaches that happened this quarter.

Read more

All this EternalPetya stuff makes me WannaCry

Get more background on the EternalPetya ransomware. Learn about its origin, attribution, decryption, and the methods of infection and propagation.

Read more

The key to old Petya versions has been published by the malware author

As research concluded, the original author of Petya, Janus, was not involved in the latest attacks on Ukraine. As a result of the recent events, Janus released his private key, allowing all the victims of the previous Petya attacks, to get their files back.

Read more

Select your language