The Life Cycle of a Compromised (Cloud) Server

Credit to Author: Bob McArdle| Date: Tue, 01 Sep 2020 12:05:16 +0000

Trend Micro Research has developed a go-to resource for all things related to cybercriminal underground hosting and infrastructure. Today we released the second in this three-part series of reports which detail the what, how, and why of cybercriminal hosting (see the first part here). As part of this report, we dive into the common life…

The post The Life Cycle of a Compromised (Cloud) Server appeared first on .

Read more

MegaCortex continues trend of targeted ransomware attacks

Credit to Author: Pieter Arntz| Date: Wed, 12 Jun 2019 16:03:25 +0000

In this threat spotlight, we feature MegaCortex, another custom ransomware designed for targeted attacks on enterprises. Will this Matrix-inspired malware strike again?

Categories:

Tags:

(Read more…)

The post MegaCortex continues trend of targeted ransomware attacks appeared first on Malwarebytes Labs.

Read more