A fourth ransomware campaign focused on Ukraine has surfaced today, following the same patterns seen in past ransomware campaigns that have been aimed at the country, such as XData, PScrypt, and the infamous NotPetya.
Ransomware developers are really trying to screw with us this week. This is shown with the CERBER Ransomware suddenly deciding to change its name to CRBR Encryptor. It's bad enough what they do with victims, now they just want to be a PITA?
This fall, Microsoft plans to release a new Windows Defender feature called Controlled Folder Access, which blocks and blacklists unauthorized apps from making changes to files located inside specially-designated folders.
A bug in systemd — an init system used in many Linux distributions to start and manage processes — allows an attacker to crash or take over machines via malicious DNS packets.
For a limited time, TrendMicro is offering a free whitepaper on title Four Countermeasures to Protect Against Ransomware. This whitepaper will discuss best practices on how to protect yourself from the continuing threat of attackers encrypting your data and then ransoming them back for bitcoins.
City of London Police announced they arrested four suspects, two men, and two women, on accusations of running tech support scams.
A draft of the "National Defense Authorization Act for Fiscal Year 2018" — which approves the budget and policies for US defensive projects — outlines a ban on the usage of Kaspersky Lab software products at DOD facilities under the explanation that the Russian antivirus vendor "might be vulnerable to Russian government influence."
The NotPetya ransomware that encrypted and locked thousands of computers across the globe yesterday and today is, in reality, a disk wiper meant to sabotage and destroy computers, and not ransomware. This is the conclusion of two separate reports coming from Comae Technologies and Kaspersky Lab experts.
After previously stating it was dropping support for EMET in July 2018, Microsoft announced yesterday plans to embed its vaunted EMET security toolkit in the Windows 10 kernel during the operating system's major update, scheduled for October-November 2017.
The Shadow Brokers have published a new message today, gloating about the damage caused by the NotPetya ransomware, and threatening to expose the real-life identity of an alleged NSA employee, who they say has been mocking the group on Twitter.
Today, WikiLeaks has published the documentation manual for an alleged CIA tool that can track users of WiFi-capable Windows devices based on the ESS (Extended Service Set) data of nearby WiFi networks.
Last week, long before the Petya / NotPetya ransomware broke out, there was another ransomware campaign that targeted Ukrainian users with a vengeance.
Today's deal is for a course that provides over 50 hours of training that help you prepare for the Security+, CEHv9 & Cisco CCNA Security exams. These courses are normally priced at $1,895, but has been discounted 98% to $29.99 as part of this deal.
The European Commission has hit Google with a record fine of €2.42 billion ($2.72 billion) for abusing its dominant market position and tweaking search results to favor its Google Shopping service to the detriment of its direct competitors.
Cybereason security researcher Amit Serper has found a way to prevent the Petya (NotPetya) ransomware from infecting computers.
Today's massive ransomware outbreak was caused by a malicious software update for M.E.Doc, a popular accounting software used by Ukrainian companies.
Posteo, the email provider where the Petya author is hosting an inbox to handle victims from today's massive ransomware outbreak, has announced that it shut down the crook's email account: firstname.lastname@example.org.
There are early signs of a new ransomware outbreak, currently affecting a large number of countries across the globe, such as the UK, Ukraine, India, the Netherlands, Spain, Denmark, and others.
On Friday, Microsoft rolled out an out-of-band security update that patched a major security flaw in the Microsoft Malware Protection Engine (MsMpEng), a core security service part of the Microsoft ecosystem.