Threat spotlight: The curious case of Ryuk ransomware

Credit to Author: Jovi Umawing| Date: Thu, 12 Dec 2019 22:33:53 +0000

From comic book death god to ransomware baddie, Ryuk ransomware remains a mainstay when organizations find themselves in a crippling malware pinch. We look at Ryuk’s origins, attack methods, and how to protect against this ever-present threat.

Categories:

Tags:

(Read more…)

The post Threat spotlight: The curious case of Ryuk ransomware appeared first on Malwarebytes Labs.

Read more

$5m bounty set on the alleged head of Evil Corp banking Trojan group

Credit to Author: Lisa Vaas| Date: Mon, 09 Dec 2019 10:53:32 +0000

Know where Maksim “Aqua” Yakubets is? Can you pry him out of Russia and his Lamborghinis? The biggest ever cybercrook reward awaits!<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/nU-wUMypTSA” height=”1″ width=”1″ alt=””/>

Read more

Emotet’s Central Position in the Malware Ecosystem

Credit to Author: Andrew Brandt| Date: Mon, 02 Dec 2019 14:01:28 +0000

As the world rolls into another Cyber Monday, and online shoppers continue their hunt for the best deals, SophosLabs wants to remind you that there&#8217;s a metaphorical malware elephant in the room that would like nothing more than to steal financial information, and the use of your computer, for nefarious ends. The Emotet Ecosystem infographic, [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/ItFCW7TqIXw” height=”1″ width=”1″ alt=””/>

Read more

How ransomware attacks

Credit to Author: John E Dunn| Date: Fri, 15 Nov 2019 14:23:41 +0000

A new report reveals what defenders should know about the most prevalent and persistent malware families.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/PHgUHbe0Xgc” height=”1″ width=”1″ alt=””/>

Read more

Update now! Windows users targeted by iTunes Software Updater zero-day

Credit to Author: John E Dunn| Date: Tue, 15 Oct 2019 12:06:07 +0000

The flaw is a rare ‘unquoted path class’ described as “so thoroughly documented that you would expect programmers to be well aware…” But that’s not the case.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/PLucYEnVB5k” height=”1″ width=”1″ alt=””/>

Read more