Twitter | Search | |
Search Refresh
Maaf ya aku Sep 10
Just hit by .meds ransomware I wish you can update your STOPdecryptor to decrypt this ransom 🙏 Thank you
Reply Retweet Like
Frepos.GHENIS Sep 8
Yesterday, one of my company's servers was infected with the virus .guesswho ransomware. On the desktop, I found a .txt file with instructions. It says that only they can decrypt the file. Should I believe them and follow their instructions?
Reply Retweet Like
Raby Sep 13
Ext Id: .id[C4BA3647-2299].[britt.looper@aol.com].phoenix Look at the Analysis of "shaofao.exe" with malicious activity.
Reply Retweet Like
Ole_:3 11h
Hello. Yesterday all the files on my computer were encrypted. File extension has changed to .guesswho On the desktop, I found a note with directions.The crackers demanded payment of the decryption.I agreed with them on 70% of the amount. Should I trust them and pay?
Reply Retweet Like
Delmen Budens 6h
One of the servers of our consulting firm was hacked. Servers unfortunately turned out to be encrypted by the virus .guesswho According to our information, this virus used to be called .guesswho We are negotiating the decryption and will soon continue the work.
Reply Retweet Like
SeamlessTrust Sep 13
Ransomware attacks: Weak passwords are now your biggest risk
Reply Retweet Like
Panzura Sep 10
How can you protect your company’s crucial from a attack? Our blog discusses how you can stop this threat with immutable data architecture.
Reply Retweet Like
Jeremy 8h
This morning my PC was infected with .guesswho ransomware. To decrypt the files, I had to pay hackers from their retirement savings. I do not advise anyone to get into this situation. Do not repeat my mistakes. Do not pay them if you can, I had no choice
Reply Retweet Like
Altatech Solutions - Information Technology MSP Sep 13
The best way to prepare employees to stop attacks is to train them. Train new employees at orientation and all employees bi-annually.
Reply Retweet Like
Isbulla Sep 12
Anyone here know how to remove .meds ransomware?
Reply Retweet Like
Kaytuso Sep 11
According to the IBM/Morning Consult survey, almost 90% of US citizens favor an increase in federal funding of to improve municipalities defenses as continue to trouble the operation of the cities.
Reply Retweet Like
Amigo-A Sep 13
Update of Extension: .n3xtpharma Note: original_filename.n3xtpharma_readme Sample: autoexec.bat.n3xtpharma_readme Email: KAY.ROBERTSON@TUTANOTA.COM, HEATHER.JOSEPH@PROTONMAIL.COM Thanks to
Reply Retweet Like
dnwls0719 Sep 14
Extension: .id-xxxxxxxx.[partfile@airmail.cc].com Sample:
Reply Retweet Like
Adlice Sep 12
New data stealer possibly linked to discovered, targeting financial and military files
Reply Retweet Like

Related searches

#cybersecurity · #infosec · #simjacker · oscp · metasploit
RiskSense Sep 12
$5.3M Ransomware Demand: And Learn Why Massachusetts City Said No Thanks
Reply Retweet Like
Raby Sep 13
2.1 Ext: .HRM Primary email: supportdecrypt@firemail.cc Look at the Analysis of "385" with malicious activity.
Reply Retweet Like
Adam Levin Sep 9
A new strain named Lilocked is actively targeting web servers:
Reply Retweet Like
Convergent Mission Solutions 24h
Some would forbid certain data from leaving China or at least slow the process of dispatching data, which would increase uncertainties.
Reply Retweet Like
CyberPolicy ® Sep 13
ICYMI: Should you pay if you are affected by ?:
Reply Retweet Like
Joseph Blankenship Sep 13
“To pay or not to pay... that is the question.”
Reply Retweet Like