Sponsored by Keepnet Labs

Tag - ransomware


Phishing and ransomware have been effective weapons for hackers. Even the most sophisticated cybersecurity measures have not been able to tackle these simple yet serious threats. In this upcoming GISEC.virtual interactive forum, powered by CyberKnight, we will be uncovering the trade secrets of cyber-attackers. A panel of technology advocates and end-user critics will be discussing the effectiveness of cyber threat [...]

Podcast with CIO Tech Asia : Living The Life In Tech

CIO Tech Asia has invited me to join them for a podcast where we discussed  some of the major cybersecurity threats currently facing businesses in 2020 and beyond, while providing deeper insights around the steps CISOs need to take to better prepare themselves for when an attack occurs. l also delve deep into the current increase of ransomware attacks on [...]

Inside the Dark Web , just released

Summary Inside the Dark Web provides a broad overview of emerging digital threats and computer crimes, with an emphasis on cyberstalking, hacktivism, fraud and identity theft, and attacks on critical infrastructure. The book also analyzes the online underground economy and digital currencies and cybercrime on the dark web. The book further explores how dark web crimes are conducted on the surface [...]

WannaCry Malware (Academic Research)

It's the Birthday of WannaCry, today the nasty Ransomware turns out 2 years old. For that "Special occasion"(!) I want to share the academic research paper which I wrote back then. Still interesting to read I believe 1.     Introduction WannaCry, also known as Wanna Decryptor, is a computer worm that targets devices running on the Windows OS . In a span [...]

Microsoft Security Intelligence Report Volume 24

The 24th edition of the Microsoft Security Intelligence Report (SIR) is now available. The report is a reflection on last year’s security events and includes an overview of the security landscape, lessons learned from the field, and recommended best practices. To create this report, the SIR team culled core insights and key trends out of a year’s [...]

BadRabbit Execution Flow

What is Bad Rabbit? Bad Rabbit is a previously unknown ransomware family. How is Bad Rabbit distributed? The ransomware dropper was distributed with the help of drive-by attacks. While the target is visiting a legitimate website, a malware dropper is being downloaded from the threat actor’s infrastructure. No exploits were used, so the victim would have to manually execute the malware dropper, which pretends to [...]

Posted By Category: Cyber SecurityTags: , , Comments: 0