While no one wants to be hit with ransomware, the fact is that one in two businesses will be infected with some type of ransomware in 2017. Knowing what to do and where to find a possible antidote or…
Spear Phishing Examples
Phishing is one of the most common attack vectors hackers use to initially infiltrate a user’s system. Phishing is an attempt to obtain user credentials, financial data, or other sensitive…
Top 7 Revelations of Vault 7
WikiLeaks dropped a bombshell on Tuesday, March 7th when it began a new series of leaks on the U.S. Central Intelligence Agency. Code-named Vault 7, Year Zero is the first series and is comprised of…
Advanced Persistent Threats and Ransomware
Advanced Persistent Threats (APT) and ransomware have been the most dreaded types of malware over the last couple of years. While there are clear and distinct differences between APTs and ransomware,…
February Ransomware in Review
Although February was a short month, there certainly wasn’t a shortage of new ransomware variants. While there were several variants that will probably never make it into circulation, there was some…
Zero-Day Attack Examples
Stuxnet is known as the world’s first cyber weapon. Stuxnet was used to break Iran’s uranium enrichment centrifuges when it was feared they were producing chemical weapons. While there’s no proof as…
Ransomware Definition
Ransomware is malicious malware that obstructs users from accessing their devices or encrypts a user’s files until the ransom is paid. There are different variations of ransomware; some variants are…
BEWARE: You Can be Sued for Cybersecurity Negligence
In this day and age, it seems like you can sue or be sued for almost anything. Now, a company is being sued for cybersecurity negligence. That’s right; you can be sued for not having proper…
DynA-Crypt - Encrypts AND Steals Your Data
New variants of ransomware appear all the time. 2017 however, is spitting out new variants with characteristics the likes we have never seen before. In January, we saw Spora which has top-notch…