Coronavirus, COVID-19 or SARS–CoV–2 has turned the lives of people across the globe into a nightmare. Attackers have utilized the pandemic as an opportunity to spread malware and ransomware by hooking on to the mindset of people in these times of crisis. Organizations opting for remote working setups has also carved out an additional opportunity […]

Read More →

RobbinHood is a relatively new ransomware that was first spotted in April 2018. A distinct feature of this ransomware is that it targets every computer individually and does not encrypt other computers via connected shares. RobbinHood claims to delete all the information related to an infected computer including the IP address, Encryption keys, etc. once […]

Read More →

RYUK is a ransomware which was first spotted in the year 2018 being distributed as a part of a targeted campaign. The attacks using this ransomware are well planned and highly targeted. This ransomware is known to have encrypted a number of PCs, storage and data centers in various organizations. The attackers behind this ransomware […]

Read More →

Apple released security updates a week ago which included a fix for a zero-day vulnerability. Morphisec discovered active exploitation of an Apple vulnerability by BitPaymer/IEncrypt campaign. BitPaymer/IEncrypt campaign has been targeting various public and private sector industries spread across the U.S. This campaign uses spearphishing emails as its initial infection vector and delivers Dridex malware. […]

Read More →

A major ransomware attack named “BadRabbit” is disrupting systems across Europe. The attack has been spreading wildly. BadRabbit locks out a user from login and demands a ransom worth of ~300$ in BitCoin. Some of the countries that are targeted are Russia, Ukraine, Bulgaria, and Turkey. Russian victims were the biggest targets accounting to about 71% of […]

Read More →

Introduction Security attacks and breaches happen routinely, costing companies millions of dollars, along with a decline in their reputation and the public’s trust in them. Attackers are constantly innovating on the different methods and paths to infiltrate networks and steal confidential information. Major data breaches occur because companies fail to patch critical vulnerabilities in time. […]

Read More →