Cisco's Talos Intelligence Group has released a free decryption tool for recovering files that have been encrypted by the PyLocky Windows ransomware, a family of malware written in Python and masquerading as a variant of the Locky ransomware.
Global email and data security company Mimecast has drawn attention, through a survey, to the extent to which the health and human services industry is being attacked through email threats.
The Necurs email botnet has made a return and, apart from spreading new variants of the Locky ransomware and the Trickybot trojan, also has new functionality that gathers telemetry data from the Windows desktop of its victims.
There has been a massive rise in email impersonation attacks — where a cyber criminal attempts to impersonate a trusted individual — around the world, as organisations fight a seemingly losing battle to prevent malicious emails from breaking through security systems.
In an incident that again underlines the danger posed by Windows ransomware, the police department of a city in Texas has lost video evidence dating back to 2009 and a host of documents following an attack by what appears to be a new strain of the Locky ransomware.
As if malware-ridden apps and drive-by infections from websites are not enough, now you can get malware from clicking on an image on social media sites.
The encrypting ransomware Locky has been adjudged the malware winner of 2016 at a Malware Awards webinar presented by security company Webroot on Wednesday.
Last week there was a tsunami of spam emails in Australia, Japan, Europe, and North America. Next week it will be bigger again.
Locky - damned good at distributing ransomware - has turned into the delivery vehicle of choice for cyber-criminals who are learning more about you to deliver even more highly targeted spear phishing.
The operators of the virulent financial Trojan Dridex have branched out into Ransomware – they hope to get ‘Locky’.