No business or user is too big or too small for ransomware. As the threat continues to evolve, organizations and end users must be equally proactive. Here are some best practices for mitigating ransomware.
Ransomware operators continue to diversify their attack tactics with the discovery of SnakeLocker—a new variant that uses two names in an attempt to dodge security scanners.
As Petya's dust settles, we learn another real-life lesson: old threats die hard. And as we saw last week, ransomware has no shortage of variety—no matter how dated their tactics and techniques may be.
The Petya ransomware family has reemerged, becoming one of the most impactful yet. Is it similar to WannaCry? Does it have a kill switch? Here are some frequently asked questions about the threat.
A South Korean web hosting company was hit by a Linux version of the Erebus ransomware. Here’s what you need to know about the threat and what sysadmins can do to defend against it.
The activity of Hidden Tear variants have been on the rise since March this year and there seems to be no signs of it stopping. Two more HT-based variants popped up this week.