malware

The NotPetya ransomware is a Brick Through Your Windows

The recent global outbreak of the "NotPetya" malware has some very curious features that have left security officials puzzled. Despite…

8 years ago

NATO CCD COE attributed the massive NotPetya attack to a ‘state actor’ and call for a joint investigation

NATO attributed the massive NotPetya attack to a 'state actor,' NotPetya and WannaCry Call for a Joint Response from International…

8 years ago

Researcher released Eternal Blues, a free EternalBlue vulnerability scanner

The security researcher Elad Erez developed Eternal Blues, a free EternalBlue vulnerability scanner that could be used to assess networks.…

8 years ago

NotPetya – Ukraine secret service announces a joint investigation with Europol, FBI, and NCA

Ukraine secret service announces joint investigation with Europol, FBI, and NCA to attribute the recent Notpetya massive attack. While security…

8 years ago

Shadow Brokers sent out first round of exploits and threaten to dox former NSA hacker

Shadow Brokers has sent out the first round of exploits to the subscribers of its service, the hackers also threaten…

8 years ago

Petwrap Ransomware massive attack – 24 hours later

A new strain of the infamous Petya ransomware dubbed Petwrap, is infecting computers in different states, mostly in Ukraine and…

8 years ago

Anthem agreed to pay $115m to settle a class-action suit brought on by the 2015 data breach

Anthem, the largest US healthcare insurance company, has agreed to pay $115m to settle a class-action suit brought on by the…

8 years ago

SamSam ransomware attacks increase and crooks demand higher ransom

Researchers at AlienVault observed a significant increase in the number of SamSam ransomware attacks, crooks are demanding $33,000 to the…

8 years ago

Honda halted production in a factory after finding WannaCry traces in its networks

The Honda company shuts down a factory in Japan after finding the WannaCry ransomware in its networks after 5 weeks…

8 years ago

Attackers can exploit electronic cigarettes to hack computers

Hackers can exploit electronic cigarettes and any other electronic device to deliver a malware in a poorly protected network. In…

8 years ago

This website uses cookies.