ransomware

QuickHealSecurity

Cosmos Bank website compromised with RIG Exploit Kit which drops Cerber Ransomware

Credit to Author: Pradeep Kulkarni| Date: Thu, 23 Mar 2017 13:22:25 +0000

Update: The incident has been taken care of by Cosmos Bank and its website (URL) is now clean and safe to use. Compromising popular websites has become a common strategy for attackers to spread infection in a widespread fashion. Attackers exploit unpatched vulnerabilities present on web servers in order to compromise…

The post Cosmos Bank website compromised with RIG Exploit Kit which drops Cerber Ransomware appeared first on Quick Heal Technologies Security Blog | Latest computer security news, tips, and advice.

Read More
QuickHealSecurity

Cerber Ransomware and Kovter Trojan Team up Together

Credit to Author: Threat Research Labs| Date: Fri, 14 Apr 2017 04:45:19 +0000

For the last 2 weeks, we have been observing a malware campaign using spam emails that look like they are from United States Postal Service (USPS) or FedEx. These emails are distributing the Cerber Ransomware along with Kovter Trojan – a lethal combination! The spam email contains a malicious script…

The post Cerber Ransomware and Kovter Trojan Team up Together appeared first on Quick Heal Technologies Security Blog | Latest computer security news, tips, and advice.

Read More
MalwareBytesSecurity

Report: Cybercrime climate shifts dramatically in first quarter

Credit to Author: Malwarebytes Labs| Date: Thu, 13 Apr 2017 09:00:09 +0000

The first quarter of 2017 brought with it some significant changes to the threat landscape and we aren’t talking about heavy ransomware distribution either. Threats which were previously believed to be serious contenders this year have nearly vanished entirely, while new threats and infection techniques have forced the security community to reconsider collection and analysis efforts.

Categories:

Tags:

(Read more…)

The post Report: Cybercrime climate shifts dramatically in first quarter appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

A week in security (Apr 03 – Apr 09)

Credit to Author: Malwarebytes Labs| Date: Mon, 10 Apr 2017 14:59:26 +0000

A compilation of notable security news and blog posts from the 3rd of April to the 9th. We focused on the 3-2-1 rule, further dissected Diamond Fox, and revealed a malvertising campaign targeting iOS users.

Categories:

Tags:

(Read more…)

The post A week in security (Apr 03 – Apr 09) appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

The top 5 dumbest cyber threats that work anyway

Credit to Author: William Tsing| Date: Sat, 08 Apr 2017 15:00:23 +0000

The common conception of cyber attacks is kind of like bad weather: ranging from irritating to catastrophic, but always unpredictable. Hackers are simply too sophisticated to draw any reliable judgments on and we shouldn’t try. As it turns out, some hackers are fairly predictable in their successful use of really dumb attacks.

Categories:

Tags:

(Read more…)

The post The top 5 dumbest cyber threats that work anyway appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

3, 2, 1, GO! Make backups of your data!

Credit to Author: Jean Taggart| Date: Wed, 05 Apr 2017 15:00:06 +0000

One of the best defenses against ransomware is having a good backup strategy. Having good backups protects your data against all sorts of unpleasant mishaps. A useful rule of thumb called the “3-2-1 rule”, learn about it here.

Categories:

Tags:

(Read more…)

The post 3, 2, 1, GO! Make backups of your data! appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

A week in security (Mar 27 – Apr 02)

Credit to Author: Malwarebytes Labs| Date: Mon, 03 Apr 2017 15:00:17 +0000

A compilation of notable security news and blog posts from March 26th to April 2nd. This week, we look back at phishing campaigns, adware, ransomware, and more.

Categories:

Tags:

(Read more…)

The post A week in security (Mar 27 – Apr 02) appeared first on Malwarebytes Labs.

Read More