EncryptedBatch Ransomware: A New Screen Locker on the Block
In our discussion of ransomware evolution, we have talked about the two major types of ransomware i.e. the ones that carry out extensive encryption activity on the targeted devices and…
In our discussion of ransomware evolution, we have talked about the two major types of ransomware i.e. the ones that carry out extensive encryption activity on the targeted devices and…
It is estimated that since 2016, the number of cybercrime cases reported have tripled. Vanbreda Risk & Benefits, a Belgian insurance broker, believes that this unusual rise is attributed to…
The Ransom Message Victims of Blower ransomware receive a file named ‘.readme.txt’ when their files have been encrypted with the ‘.blower’ extension. These cybercriminals were also known to charge $980,…
The Top Vector for Malware Distribution The very same report that brought us the above mentioned stats also concluded that email remains the top medium for the distribution of malware…
Businesses in North America are becoming increasingly weaker as cybercriminals remain more dangerous than ever. This time, the ransomware strain picked out a prominent name in Canada, Olympia Financial Group…
In mid 2000s, Amazon became one of the pioneers in the cloud computing industry as it released the highly popular AWS (Amazon Web Services). Soon, in the next decade, cloud…
With each passing day, the birth of ransomware strains is rising as they become more sophisticated and cunning in their attacks. As opposed to older attacks, each of these attacks…
It is becoming increasingly difficult for businesses to create cybersecurity solutions to battle the new wave of cybercriminals. Since cybercriminals are changing their hacking tactics continuously, traditional protection measures are…
If you haven’t been formally acquainted with Cosanostra ransomware, it is a form of cyber threat which uses encryption algorithms which are military-grade! Once you’ve been hit with these variants,…
On the 5th of February, Dr. Thomas DeLuca & Associates had been in search for ransomware removal strategies when their clients’ personal data had been breached. This is also when…