<img height="1" width="1" alt="" style="display:none" src="https://www.facebook.com/tr?id=619966238105738&amp;ev=PixelInitialized">

Everything You Always Wanted to Know about Ransomware but Were Afraid to Ask

BadBlock, Cerber, Chimera, CoinVault, Crypt0L0cker, CryptoJoker, CTB-Locker, Jigsaw, KeRanger, Locky, NanoLocker, Petya, Samas, TeslaCrypt, zCrypt… these are just a few out of the hundreds of ransomware cropping up in the past year.

Cyber-Security in 120 Secs: The Shadow Brokers Release NSA Tools

This week an apparent hacking group released NSA tools that prove that the agency hoarded 0-days in security products, 20 HEI Hotel properties were hacked, and WikiLeaks has reportedly been hosting malware in some of their files that have...

Adding UAC Bypass to the Attacker’s Tool Set

Recently our researchers revealed a new way that attackers can bypass Microsoft’s User Access Control (UAC) mechanisms.

Cyber-Security in 120 Secs: Project Sauron

This week’s events were led by a state-sponsored malware dubbed "Project Sauron" AKA "Strider, that was successfully hiding out for at least 5 years prior to being discovered, Oracle-owned MICROS experienced a PoS attack that is still under...

Cyber-Security in 120 Secs: The Comeback of Gozi Malware

This week we saw Gozi malware making a comeback, a huge increase in C & C servers using SSL cloaking malware, and Banner Health was compromised with 3.7M patients being affected.

Highlighting the cyber-security news from the past week in a...