In the third and final part of this series, we will explore Cerber, the most devious ransomware, and its behavior. Red Cerber:  The campaign of Red Cerber started in early 2017 after a small break. Developers of Cerber came up with a new and deadly version which had some improvements in its behavior. It noticeably changes […]

Read More →

Let’s continue from where we left off last week, and will go through the behavior patterns of the next versions of the Cerber Ransomware. Cerber3.0: Cerber3.0 RIG-V exploit kit is an updated version of Cerber2.0. After the release of Cerber2, security vendors released some decryptors to decrypt the files that were encrypted by the ransomware. […]

Read More →

Breaches continue to occur regardless of existing tools. In Feb 2017, a hack compromised the account details of more than 2.5 million PlayStation and Xbox users. The data breach happened in 2015 but was only found out this year. Lack of visibility and endpoint security controls contributes to security breaches and financial loss. A combination […]

Read More →

(Image source: WordPress ) WordPress the easiest, one of the most powerful blogging and website content management system has silently fixed a dangerous vulnerability in WordPress REST API Endpoint which was recently added to WordPress version 4.7.0 and enabled by default. The REST API has been affected by an unauthenticated privilege escalation vulnerability, that could possibly lead to […]

Read More →