CyberArk has created an online version of 'White Phoenix,' an open-source ransomware decryptor targeting operations using intermittent encryption. Using the online White Phoenix is as simple as ...
Victims of the CoinVault ransomware might be able to decrypt their files with a free tool released by Kaspersky Lab together with the Dutch police. The tool can be found at ...
Romanian cybersecurity firm Bitdefender has released a free decryption tool for MortalKombat, a months-old strain of ransomware targeting predominantly cryptocurrency users. MortalKombat, named after ...
Researchers are warning that the VECT 2.0 ransomware has a problem in the way it handles encryption nonces that leads to ...
Cybersecurity analysts have released a decryptor for BianLian ransomware that could allow victims to retrieve their encrypted files for free -- and avoid paying a ransom demand to cyber criminals.
A decryptor for the FunkSec ransomware has been developed and made avaliable to download for free by researchers at antivirus provider Avast. Ladislav Zezul, a malware researcher at Avast’s parent ...
Threat hunters are warning that the cybercriminal operation known as VECT 2.0 acts more like a wiper than a ransomware due to ...
Tom's Hardware on MSN
Ransomware accidentally destroys all files larger than 128KB, preventing decryption
This might be the work of an amateur, but they might not stay an amateur for long.
Understanding how to buy bitcoins and pay ransomware authors for decryption keys is hard enough, yet some cybercriminals now expect their victims to do it in under an hour if they want all of their ...
Ransomware started out many years as scams where users were being tricked into paying fictitious fines for allegedly engaging in illegal online behavior or, in more serious cases, were blackmailed ...
Couldn't figure out a better forum for this. Hopefully soon I'll have some money to buy a low-end NAS that I can use for backups which I can make a little safer than a connected USB drive, in terms of ...
Some ransomware groups are now using a new method to try to bypass those detections. Most cybercriminals running ransomware operations are under the spotlight. Not only are they investigated by law ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results