As stated in the IoT Ransomware Attacks – Part 1 IoT ransomware is not just holding your data hostage, it can lead to denial of service until the demanded ransom is payed to the hackers, which is quiet a big market for hackers to see money. There will be greater threat for all industries using […]

Read More →

Ransomware has already managed to carve itself a slot as one of the main cyber security threats in recent years. Individuals, government agencies, and private organizations are each taking precautionary steps to protect against ransomware that can encrypt files beyond one’s reach. What we’re ignoring though is the next wave of ransomware attacks which will […]

Read More →

There may be a possible ‘second wave’ of massive global cyber attack, as SMB (Server Message Block) was not the only network protocol whose zero-day exploits created by NSA were exposed in the Shadow Brokers release. The WannaCry emergency cannot be ended because the NSA Tools leaked by the Shadow Brokers team included many other dangerous […]

Read More →

The blackhats have created a new strain of malware that targets the same vulnerability as the WannaCry ransomware from the first week of May. The Malware is called as EternalRocks, which uses the same flaw in Microsoft’s SMB networking protocol to infect other Windows systems that haven’t yet been patched with MS17-010. However, this new […]

Read More →

Let’s continue from where we left off last week, and will go through the behavior patterns of the next versions of the Cerber Ransomware. Cerber3.0: Cerber3.0 RIG-V exploit kit is an updated version of Cerber2.0. After the release of Cerber2, security vendors released some decryptors to decrypt the files that were encrypted by the ransomware. […]

Read More →