google-site-verification: google30a059f9a075f398.html

Tag: Ransomware

Beware of Thanatos Ransomware, the latest cyber-extortion scam with hard-to-decrypt unlock code

CyberWisdom Safe Harbor Commentary on Thanatos Ransomware A must-read story from expands a little-known ransomware program is infecting computers, requiring Bitcoin cash to let users unlock their files. A report by Bleeping Computer highlights the new ransomware discovered by MalwareHunter team security experts, known as Thanatos. It is worth noting that it will create an

Ransomware: Get ready for the next wave of destructive cyberattacks

CyberWisdom Safe Harbor Commentary on Ransomware What is most likely to be an overlooked story from outlines an interesting article.   It may seem unwelcome compared to 2017, but writing off ransomware is still stupid as more malware-hardened attacks using files will take place in the future. High profile events such as WannaCry, NotPetya and

How To Stop Ransomware Affecting Your Computer with Six Remedies

CyberWisdom Safe Harbor Commentary on Ransomware Remedy: What is most likely to be an overlooked story from explores revealing six listed Ransomware remedies to protect our computers and prevent ransomware from affecting them. Always keep a backup We all save important data on our computer, whether it is our document or movie collection. What

Cyber Blackmail Expanding Beyond Ransomware to IoT and Social Media

CyberWisdom Safe Harbor Commentary on Cyber Blackmail Today I came across this story from that covers digital extortion which really cybercriminal cyber blackmail. When we think of cyber blackmail, we often think of ransomware. But now cybercriminals are looking for new ways to shatter organizations beyond blackmail. Cybercriminals already know that many businesses will pay if

GandCrab Ransomware Distributed by Exploit Kits, Appends GDCB Extension

CyberWisdom Safe Harbor Commentary on GandCrab Ransomware: reveal a post from Malwarebytes exposing a new ransomware, GandCrab, was released late last week and is currently being released through exploits. GandCrab has some interesting features not seen in ransomware, such as the first one to accept DASH currency and the first one to use Namecoin support .BIT tld.

Fictional SpriteCoin Cryptocurrency Packs a Ransomware Punch

CyberWisdom Safe Harbor Commentary on Fictional SpriteCoin Cryptocurrency: A must-read story from features a little-known ransomware that accepts only Monero payments has appeared and is trying to trick the victim by disguising as a password-protected SpriteCoin storage mechanism. SpriteCoin does not exist, but – this is a fictitious cryptocurrency. According to Fortinet’s FortiGuard lab, malware

Are You Ready for the Evolution of Ransomware?

CyberWisdom Safe Harbor Commentary: A recent story from defines a worrisome fact that ransomware once again becomes a major threat in 2017 as cybercriminals continue to prove how effective it is to make money. But in 2017, we also saw the evolution of ransomware, as malware combines ransomware with self-propagating worms in an attempt

Why Meltdown and Spectre are ripe for ransomware attacks

CyberWisdom Safe Harbor Commentary: Today I came across this story from that declares a little known possibly that Meltdown and Spectre vulnerabilities are a path and ripe for ransomware attacks Before we study the solution, let’s take a closer look at Spectre and Meltdown. Specter breaks the isolation between different applications. It allows attackers to

Danger Rises of Fileless Attacks on Your Devices and the Cloud

Danger Rises of Fileless Attacks on Your Devices and the Cloud Path of a Fileless Attack CyberWisdom Safe Harbor Commentary: In recent Fileless attacks, such as Ransomware, are easier and more effective than traditional malware-based threats and present a growing challenge to business goals. Cybercriminals take the path of least resistance, which is why more people are

Protecting Your Networks from Ransomware

CyberWisdom Commentary: Ransomware targets the home user, business, and government networks and may result in temporary or permanent loss of sensitive or proprietary information, interruptions in normal operations, economic loss of recovery of systems and documentation, and potential damage to the reputation of the organization. Educate your staff Attackers often enter the organization by tricking