ニュース

Ransomware: Now cybercriminals are stealing code from each other, say researchers Those behind PetrWrap are apparently using code from another form of ransomware without paying for it.
The little snippet of Python code strikes fast and nasty, taking less than three hours to complete a ransomware attack from initial breach to encryption.
New Python ransomware targets virtual machines, ESXi hypervisors to encrypt disks By targeting ESXi, encryption was achieved in less than three hours on a corporate network.
Operators of an unknown ransomware gang are using a Python script to encrypt virtual machines hosted on VMware ESXi servers.
A Ukrainian security researcher has leaked newer malware source code from the Conti ransomware operation in revenge for the cybercriminals siding with Russia on the invasion of Ukraine.
Join us for this new webinar featuring Roger Grimes, Data-Driven Defense Evangelist at KnowBe4. He will crack the code of ransomware, sharing insights on how to prevent, detect, and empower your users ...
The Russian-linked cyber crime gang associated with carrying out a major ransomware attack against a software company used a code that avoids targeting systems that use Russian and other former Sov… ...
The original author or authors of the Petya ransomware resurfaced Wednesday to offer help in combatting a global malware epidemic that, in part, was based on their original code.
Two extensions that encrypt files and issue a ransomware message were undetected in the official Visual Studio Code marketplace.