Threats

Microsoft Azure Attack Illustrates Ongoing DDoS Threats

Officials with Microsoft’s Azure public cloud said the company in late August was able to stave off a record distributed denial-of-service (DDoS) attack against...

Becoming a Cybercriminal Keeps Getting Easier

Zero-day vulnerabilities are no longer exclusively for elite hackers. There are now automated scripts available on GitHub so even novice hackers can explore these...

New Python-based Ransomware Encrypts Virtual Machines Quickly

Sophos cybersecurity researchers have discovered a Python-based ransomware operation that escalated from a compromised corporate network to encrypted virtual machines in just three hours. VMware...

Qualys Automates Ransomware Risk Assessment

Qualys this week launched a new Ransomware Risk Assessment Service that's designed to help enterprises understand their potential exposure to ransomware and automate the...

White House, Congress Target Ransomware Payments

The surge in ransomware attacks in the last year have spurred attempts by government officials to bolster cybersecurity defenses, and those actions advanced on...

How Ransomware Uses Encryption – And Evolves

Ransomware attacks are a huge concern these days, especially for corporate networks. Successful assaults can lead to locked up data and systems, as well...

5 Good Reasons to Hire a Ransomware Recovery Expert

Spending money you hadn't budgeted to hire experts to clean up an unexpected mess is at the bottom of every manager's wish list, but...

How to Recover From a Ransomware Attack

First, we prepare a plan for the possibility, then when a ransomware attack occurs we execute the plan. So easy to say, so difficult...

Best Ransomware Removal and Recovery Services

Malware has been around for nearly 40 years, longer even than the World Wide Web, but ransomware is a different kind of threat, capable...

More Than 90 Percent of Malware in Q2 Came Via Encrypted Traffic: WatchGuard

A surprising 91.5 percent of all malware detected on networks of WatchGuard Technologies customers in the second quarter came over encrypted connections, raising the...

Latest articles