Troj/Locky-ACI
more…A Look at Locky Ransomware’s Recent Spam Activities
Ransomware has been one of the most prevalent, prolific, and pervasive threats in the 2017 threat landscape, with financial losses among enterprises and end users now likely to have reached billions of dollars. Locky ransomware, in particular, has come a long way since first emerging in early 2016. Despite the number of times it apparently […] more…Troj/Locky-ACB
more…Troj/Locky-ABW
more…Troj/Locky-AAX
more…Troj/Locky-AAW
more…Troj/Locky-ZS
more…Troj/Locky-ZZ
more…Troj/Locky-UP
more…Troj/Locky-ZL
more…Troj/Locky-ZJ
more…Using DNS to weaken Locky, the powerful ransomware threat
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. Ransomware and other cyberthreats often go unseen by traditional detection methods like antivirus, deep packet inspection (DPI) or sandboxing. In fact, a report by Lastline Labs indicates that 51% of zero-day malware—threats that […] more…Troj/Locky-YO
more…Troj/Locky-YH
more…Troj/Locky-YE
more…Troj/Locky-YA
more…More information
- German Authorities Take Down Crypto Swapping Service eXch
- Microwave hacked into weapon, used to blow up a stereo
- New Details Surface on Equifax Breach
- Amazon Launches AWS Data Protection Service
- White label SOS panic buttons can be hacked via SMS
- Malicious Mobile Apps (MMA) – A Growing Threat in 2013 and Beyond
- Apple and OpenAI currently have the most misunderstood partnership in tech
- IT Managers Face Security, Management Challenges with Proliferating Mobile Devices
- The Duqu 2.0 persistence module
- Resolved: Scheduled iTwo Outage for 7/20/2013 (Sat) 7am-12pm