A new ransomware called CommonRansom was discovered that has a very bizarre request. In order to decrypt a computer after a payment is made, they require the victim to open up Remote Desktop Services ...
Cybercriminals are continuing to refine their ransomware tools and attack techniques. See Also: Virtual Cloud Ransomware Tabletop: Unpacking an Attack from Detection to Recovery Notably, the gang ...
A victim of the Muhstik Ransomware has hacked back against his attackers and released close to 3,000 decryption keys for victims along with a free decryptor to get their files back. Since the end of ...
Even top-of-the-range antivirus software can’t restore encrypted data unless a certain decryption key has been developed for ...
Ransomware can strike any industry, from logistics and media companies to non-profit organizations and governments. Even hospitals are targets for ransomware, holding data and lives hostage.
Last week the PGPocalipse was all over the news… Except that, well, it wasn’t an apocalypse. A team of researchers published a paper(PDF) where they describe how to decrypt a PGP encrypted email via a ...
CVE-2026-1357 exposes a critical WordPress WPvivid plugin flaw, allowing unauthenticated RCE, enabling attackers to upload PHP files and fully compromise sites. The post CVE-2026-1357: WordPress ...