Email campaigns pushing Locky ransomware are still very prevalent and continue to evolve. Encrypted files are now appended with the .asasin extension. This particular analysis shows that the threat actors were not successful in distributing the new variant. Rather than attaching a .7z archive as they typically do, they attached the base64 encoded text of the archive. The text was decoded and links were extracted by our labs team. Analyzing the binary revealed the......
Vertek’s OTX Public and Private Pulses provide a summary of the threat, some information regarding the software targeted, and...Read More
Calculate your potential savings by outsourcing Use our FREE savings worksheet Download NowRead More
Escalating and Evolving Fear/Events: It’s clear that we are all targeted Multiple attack vectors are in play Attack surfaces...Read More
It’s important to note that preventing attacks is becoming more and more involved due to threats being targeted across...Read More
Cyber security officials from the Securities and Exchange Commission (SEC) agree that data theft is not a question of if...Read More
This cyber security threat may already be living in your network. Networks are robust, evolving environments with little changes...Read More
We all know that maintaining a secure network is the first defense against cyber attacks from external threats, but...Read More