<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=439793516377641&amp;ev=PageView&amp;noscript=1">

CATEGORY ARCHIVES: ransomware

These Factors MUST Work For Every Successful Ransomware Attack. DNS is Always Involved.

A government agency that found itself infected with ransomware and having to pay the ransom to restore service. Another local agency has opted not to pay the ransom and restore operations. Ransomware targeted at organizations is still a threat and even with backups, you have a highly disruptive and public event to try to get back online that comes with serious costs and potentially lost revenue.

Read More

Share this:

John Bambenek Speaking at Infragard Symposium: A Primer on Cyber Security Intelligence & the Need For Threat Sharing

Read More

Share this:

Webcast with John Bambenek: Dangerous Lessons Learned from 2018's Healthcare Breaches

Read More

Share this:

Why Foreign Hackers Are Targeting Lawmakers' Personal Accounts

Sen. Ron Wyden (D-Ore.) on Capitol Hill in Washington on Dec. 19, 2017. (Carolyn Van Houten/The Washington Post)

Read More

Share this:

Bi-Weekly Security Update 8/30/2017

Malicious Content Identified and Inserted:

Read More

Share this:

Bi-Weekly Security Update 8/18/2017

Malicious Content Identified and Inserted:

Read More

Share this:

Abuse.ch Targets, Blocking Three Additional Ransomwares

 

ThreatSTOP Security Researchers have added three new target lists to our system. These targets leverage additional data from the ransomware tracker at abuse.ch to secure against ransomware threats.

Read More

Share this:

Author Releases Private Key Unlocking Petya/GoldenEye Ransomware

In light of the devastating NotPetya attack, the creator of the original Petya ransomware has released his private key for the malware. This means victims of the original Petya attacks (excluding NotPetya) will be able to decrypt their files for free.

Read More

Share this:

Bi-Weekly Security Update 8/3/2017

Read More

Share this:

Bi-Weekly Security Update 7/24/17

Malicious Content Identified and Inserted:

Read More

Share this:

Home Page

OTHER THREATSTOP OUTLETS

  1. ThreatSTOP on YouTube
  2. ThreatSTOP on Twitter