New Crypto-Ransomware Targets Linux
Instead of targeting end users with weaponized documents that encrypt their file system, this new breed of ransomware is targeting the web servers themselves.
More results...
Instead of targeting end users with weaponized documents that encrypt their file system, this new breed of ransomware is targeting the web servers themselves.
Registered users’ names, email addresses and order history have been accessed.
The bot is used to send spam email, capture sensitive information or download and execute malicious files.
Computer code and cyber-weapons capable of killing adversaries will be developed under a new half-billion-dollar military contract.
About 10% of employees have lost a device with sensitive business info, 12% use shadow IT and 37% have access to information that is above their position.
The group has leaked more than 3,500 names, email addresses and contact numbers of law enforcement and military personnel.
Kaspersky Lab’s investigation into the connected home discovered that almost all of the devices tested contained vulnerabilities.
XcodeGhost has maintained persistence—and has indeed evolved to become even more dangerous.
Most organizations fail to secure the holes within their environment faster than cyber-criminals can wreak havoc.
The Angler exploit kit has freshened up with new Flash exploits and watering-hole techniques.