The new cyber attacks

/The new cyber attacks

NSA Malware: Leaked Code Leaves Millions Vulnerable

In mid-April hacker group, The Shadow Brokers released a package of confidential NSA documents including computer codes for exploits, implants, and other hacking tools. Through reverse engineering and tutorials available on the dark web, cybercriminals have infiltrated hundreds of thousands of computers running Windows with this NSA malware. The use of this cyber weapon proves [...]

Locky Ransomware: Back in Action with a New Delivery Method

Locky ransomware was one of the most popular malware programs throughout 2016. 7 out of 10 malicious emails delivered Locky in Q2 of 2016, and by the end of Q4 97% of all phishing emails were distributing Locky. Strangely, however, the spread of Locky took a dramatic downturn in early 2017 and there hadn’t been [...]

Ransomware | Polymorphic Malware

Cyber-attacks are a constant threat. They are continuously evolving, increasing in number, and becoming more dangerous. Ransomware is no exception to this trend. In 2016, ransomware became the most common form of malware in the US, with a shocking 600% growth in new ransomware families in just 12 months. As ransomware continues to evolve, its [...]

By | 2017-11-07T16:17:28+00:00 March 3rd, 2017|Malware - Ransomware, The new cyber attacks|0 Comments

LinkedIn Phishing Scam: Motives Unclear, but Still a Threat

We seem to write about a new phishing or spear phishing scam every day. This latest LinkedIn scam has all of the classic signs of phishing. It comes from a suspicious sender, has bad grammar, and even uses an urgent call to action to scare victims into clicking the link. A link that appears to [...]

Email Protection: The best defense against Brazil’s latest live scam

Email protection is more important than ever as new scams seem to pop up every day. Between the business email compromise (BEC), fake Dropbox login pages, and QR code scams, phishing attacks are occurring all the time. And they are becoming increasingly damaging. Although these scams all seem to be fundamentally different, they all have [...]