TeslaCrypt

How to recover files encrypted by all Teslacrypt Ransomware variantsHow to recover files encrypted by all Teslacrypt Ransomware variants

How to recover files encrypted by all Teslacrypt Ransomware variants

Experts from Cisco Talos team have improved their decryptor tool to allow the recovery of files encrypted by all the…

9 years ago
Watch out, Angler Exploit Kit is able to bypass Microsoft EMET defenseWatch out, Angler Exploit Kit is able to bypass Microsoft EMET defense

Watch out, Angler Exploit Kit is able to bypass Microsoft EMET defense

Security experts from FireEye have observed attacks leveraging on Angler EK to deliver exploits capable of evading the Microsoft EMET…

9 years ago
A new strain of Teslacrypt implements sophisticated evasionA new strain of Teslacrypt implements sophisticated evasion

A new strain of Teslacrypt implements sophisticated evasion

The authors of the TeslaCrypt ransomware have improved it by implementing new sophisticated evasion techniques and targeting new file types.…

9 years ago
Admedia attacks now rely also on Joomla to serve ransomwareAdmedia attacks now rely also on Joomla to serve ransomware

Admedia attacks now rely also on Joomla to serve ransomware

Operators running websites based on the WordPress and Joomla must be aware of a spike in the number of compromised…

9 years ago
Emergency. Hundreds of compromised WordPress sites serve TeslaCrypt ransomwareEmergency. Hundreds of compromised WordPress sites serve TeslaCrypt ransomware

Emergency. Hundreds of compromised WordPress sites serve TeslaCrypt ransomware

Operators running websites based on the WordPress must be aware of a spike in the number of compromised platforms used…

9 years ago
A flaw in TeslaCrypt ransomware allows file recoveringA flaw in TeslaCrypt ransomware allows file recovering

A flaw in TeslaCrypt ransomware allows file recovering

The victims of the infamous TeslaCrypt ransomware can now rejoice, there is a free tool to decrypt files encrypted by…

9 years ago
Angler exploit kit includes the code of a recent Flash flawAngler exploit kit includes the code of a recent Flash flaw

Angler exploit kit includes the code of a recent Flash flaw

A security researcher discovered a new variant of the Angler exploit kit that includes the exploit code for a recently…

9 years ago
Hundreds million legit websites could serve Ransomware because of Script Injection compromiseHundreds million legit websites could serve Ransomware because of Script Injection compromise

Hundreds million legit websites could serve Ransomware because of Script Injection compromise

Heimdal Security published an interesting post on the increase in malicious scripts that are being injected into legit websites in…

10 years ago
TeslaCrypt 2.0 ransomware comes with significant improvementsTeslaCrypt 2.0 ransomware comes with significant improvements

TeslaCrypt 2.0 ransomware comes with significant improvements

Researchers at Kaspersky Lab have discovered a new strain of TeslaCrypt ransomware, version 2.0,  which was improved in a significant…

10 years ago
New AlphaCrypt ransomware, the new threat in the criminal undergroundNew AlphaCrypt ransomware, the new threat in the criminal underground

New AlphaCrypt ransomware, the new threat in the criminal underground

AlphaCrypt ransomware is a new type of ransomware has been detected by security expert in the wild. The malware is…

10 years ago