Source Link Ahead of the Anti-Ransomware Day, we summarized the tendencies that characterize ransomware…
Malware Technologies
-
-
Mobile SecuritySecurity
The Trojan subscribers Joker, MobOk, Vesub and GriftHorse
by Igor Golovinby Igor GolovinSource Link Billing fraud is one of the most common sources of income for…
-
Source Link In February 2022 we observed the technique of putting the shellcode into…
-
Source Link Yanluowang is a type of targeted ransomware discovered by the Symantec Threat…
-
Source Link Yanluowang is a type of targeted ransomware discovered by the Symantec Threat…
-
Source Link Emotet was first found in the wild in 2014. Back then its…
-
Source Link In early December 2021, a new ransomware actor started advertising its services…
-
Source Link For the Lazarus threat actor, financial gain is one of the prime…
-
Mobile SecuritySecurity
Elections GoRansom – a smoke screen for the HermeticWiper attack
by GReATby GReATSource Link Executive summary On February 24, 2022, Avast Threat Research published a tweet…
-
Source Link Roaming Mantis is a malicious campaign that targets Android devices and spreads…