A new ransomware called CommonRansom was discovered that has a very bizarre request. In order to decrypt a computer after a payment is made, they require the victim to open up Remote Desktop Services ...
Cybercriminals are continuing to refine their ransomware tools and attack techniques. See Also: Virtual Cloud Ransomware Tabletop: Unpacking an Attack from Detection to Recovery Notably, the gang ...
A victim of the Muhstik Ransomware has hacked back against his attackers and released close to 3,000 decryption keys for victims along with a free decryptor to get their files back. Since the end of ...
Even top-of-the-range antivirus software can’t restore encrypted data unless a certain decryption key has been developed for ...
Last week the PGPocalipse was all over the news… Except that, well, it wasn’t an apocalypse. A team of researchers published a paper(PDF) where they describe how to decrypt a PGP encrypted email via a ...
Like with any industry, the information security industry, more commonly referred to as “cybersecurity,” for all its raging debates, has rallied around a small corpus of best practices. One of the ...