How Was ESC Corporate Services Infected?
Recently, ESC Corporate Services was attacked by a ransomware campaign. So how were they infected? The web portal of the company became non-functional at around 4 a.m. on 25th October….
Recently, ESC Corporate Services was attacked by a ransomware campaign. So how were they infected? The web portal of the company became non-functional at around 4 a.m. on 25th October….
The ransomware frenzy has raised quite a few eyebrows in India. India has been known to be one of the biggest victims of such attacks. Recently, the Delhi Police—the police…
According to an official from the West Nipissing Police, the victim mended his ways and improved his cybersecurity defense. For this purpose, he bought an antivirus solution, which could help…
Recently, a new ransomware surfaced. The ransomware’s modus operandi includes the installation of DiskCryptor on the victim’s computer. Afterward, the computer reboots. However, unlike their regular screens, users are met…
Remember Crypt Console 2? Well, looks like it has a new successor. Reports have begun to emerge regarding its more advanced variant, which is known as CryptConsole Ransomware. The ransomware…
Another day, another cyberthreat. Unsurprisingly, the usual suspect is the same, .i.e., a ransomware strain. Security experts found a new villainy malware. It is known as Funny Ransomware. It was…
Early this year, Hinesville, a city in Georgia, was attacked by a ransomware and was pressurized to pay ransom for ransomware removal. So how did the administration manage to neutralize…
Beazley, an insurance company, has uncovered some interesting numbers on the latest ransomware strains. The report—which was published by Beazley Breach Response Services team—illustrated an astonishing fact: ransom demands are…
Austal, a renowned Australian shipbuilder and defense contractor, stated that it was recently compromised. The reason behind this unexpected disaster has been attributed to a fierce ransomware attack. It has…
Every other day, cybersecurity researchers discover new cryptovirological strains. In most of the cases, the discovered cryptovirological strains show regular activity i.e. locking down the data on targeted devices and…