Troj/Locky-ACI
more…A Look at Locky Ransomware’s Recent Spam Activities
Ransomware has been one of the most prevalent, prolific, and pervasive threats in the 2017 threat landscape, with financial losses among enterprises and end users now likely to have reached billions of dollars. Locky ransomware, in particular, has come a long way since first emerging in early 2016. Despite the number of times it apparently […] more…Troj/Locky-ACB
more…Troj/Locky-ABW
more…Troj/Locky-AAX
more…Troj/Locky-AAW
more…Troj/Locky-ZS
more…Troj/Locky-ZZ
more…Troj/Locky-UP
more…Troj/Locky-ZL
more…Troj/Locky-ZJ
more…Using DNS to weaken Locky, the powerful ransomware threat
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. Ransomware and other cyberthreats often go unseen by traditional detection methods like antivirus, deep packet inspection (DPI) or sandboxing. In fact, a report by Lastline Labs indicates that 51% of zero-day malware—threats that […] more…Troj/Locky-YO
more…Troj/Locky-YH
more…Troj/Locky-YE
more…Troj/Locky-YA
more…More information
- Shape Security Raises $51 Million at $1 Billion Valuation
- Cybersecurity experts investigate self-adapting computer network
- Malware Served via Anti-Adblocking Service PageFair
- John McAfee goes Hollywood with Warner Bros. movie deal
- Telenor hopes to encourage phone recycling by erasing data more securely
- Microsoft Windows Media Player CVE-2019-1481 Information Disclosure Vulnerability
- Large Number of iOS Apps Infected by XcodeGhost
- Does cyber insurance make us more (or less) secure?
- Uncommon Radixes Used in Malware Obfuscation
- Microsoft Patches IE Zero-Day, 98 Other Vulnerabilities