Petya-Like Wormable Malware: The “Who” and the “Why”
By Rick Holland, VP Strategy at Digital ShadowsRead More…
By Rick Holland, VP Strategy at Digital ShadowsRead More…
The Petya ransomware was designed to lock files on the infected computer and demand payment from victims to get their files unlocked. Following the launch of the Petya ransomware attack around the world last week, Microsoft’s telemetry data has now shed some light on the scale of the worm-able ransomwareRead More…
Ransomware initially targeted individuals through phishing or other infection techniques that required user interaction. While profitable to the cybercriminals, such campaigns took time to reach a big scale. The WannaCry attack that happened in May, took ransomware to the next level by introducing worm-based compromise of machines. This Tuesday’s attacks,Read More…
The rapid pace of the new Petya ransomware attack points at another worm that can spread from computer to computer by itself, Mimecast has said. In an advisory, Steven Malone, director of security product management at Mimecast, commented, “Many commentators think WannaCry came from hackers in Russia, perhaps as an experiment thatRead More…
The WannaCry ransomware is not dead yet and another large scale ransomware attack is making chaos worldwide. The attack is shutting down computers at corporate houses, power supplies, and banks across Russia, Ukraine, Spain, France, UK, India, and Europe and demanding $300 in bitcoins. According to multiple sources, a newRead More…
Guest written by Rick Holland, Vice President, Strategy, Digital Shadows.Read More…
Mimecast has collaborated with PhishMe to integrate their expansive security educational content to help organizations improve employee awareness of common email-borne attacks.Read More…
Security experts from Beyond Security, a leading provider of automated security testing solutions including vulnerability assessment, released 5 effective and easy tips to follow for protecting against serious Internet security threats that can cause both financial and emotional damages: 1. Use an up-to-date and supported operating system. All victims ofRead More…
Copyright © 2026 - Zarks Media. All rights reserved