Estimated reading time: 5 minutes
How To Defend Against Advanced Persistent Threats (APTs): A Comprehensive Approach In today’s time, one of the most formidable threats organizations face today is the Advanced Persistent Threat (APT). These sophisticated, targeted attacks are designed to infiltrate networks, steal...Estimated reading time: 5 minutes
Ghost Locker is a Ransomware-as-a-Service (Raas) created by GhostSec [hacktivist groups]. In October 2023, GhostSec launched the GhostLocker framework. After their successful collaborative operations with the Stormous ransomware group in July 2023, GhostLocker ransomware operators provide various options for...Estimated reading time: 4 minutes
Introduction: Originating in March 2023, Abyss Locker, a recently established ransomware operation, has swiftly targeted companies, transforming into a significant threat across various sectors, such as industrial control systems (ICS), enterprises, and public-sector organizations. It poses a significant threat...Estimated reading time: 4 minutes
Ransomware attacks today have become increasingly prevalent and sophisticated. One such alarming trend is the surge in remote ransomware attacks, also known as malicious remote encryption. This attack vector involves using compromised endpoints to encrypt data on other devices...Estimated reading time: 5 minutes
Our recent research has highlighted the presence of the MedusaLocker ransomware, which first surfaced in mid-2019. Its primary targets are the Hospital and Healthcare industries. MedusaLocker employs AES and RSA encryption techniques to encrypt victims’ data. Technical analysis At...Estimated reading time: 7 minutes
Introduction: First observed in the middle of 2021, Mallox Ransomware has emerged as a formidable threat in the cybercrime landscape. With its ability to encrypt all volumes, including local and network-shared drives, it gradually spreads control over the system,...