Double-Encrypting Ransomware

This article has been indexed from Schneier on Security This seems to be a new tactic: Emsisoft has identified two distinct tactics. In the first, hackers encrypt data with ransomware A and then re-encrypt that data with ransomware B. The…

Email Campaign Spreads StrRAT Fake-Ransomware RAT

This article has been indexed from Threatpost Microsoft Security discovered malicious PDFs that download Java-based StrRAT, which can steal credentials and change file names but doesn’t actually encrypt. Read the original article: Email Campaign Spreads StrRAT Fake-Ransomware RAT

An Overview of DDoS Attacks in Q1

This article has been indexed from Security Boulevard Ransom DDoS and the reliance on remote operations/teleworking fueled attacks on finance, biotech and pharmaceutical industries. The post An Overview of DDoS Attacks in Q1 appeared first on Radware Blog. The post…