File-encrypting malware that are still in development and ransomware that appear to take cues from older families highlight this week’s ransomware recap.
The notorious Locky and CERBER families highlight the trend of ransomware gaining new features while still relying on traditional distribution tactics.
Exploits found in the trove of malware recently leaked by hacking group Shadow Brokers are reportedly being used to install ransomware and backdoor. Are your systems protected?
A new wave of Hidden Tear ransomware once again shows how easily open source code can be abused. We also see ransomware developers deviating from the typical threat behavior.
This Infosec Guide will tackle the primary threats organizations face when implementing BYOD programs, as well as best practices and solutions to mitigate these threats.