Twitter | Search | |
Search Refresh
Karsten Hahn Jun 14
I found this advertisment for a Tool on Reddit this morning. Seems fishy? Let's take a look.
Reply Retweet Like
Karsten Hahn Jun 12
I wrote a detailed and technical article about ransomware identification for analysts. 😃 I put my 💙into this. Enjoy!
Reply Retweet Like
Bogdan Botezatu Jun 17
You asked, we delivered. New decryptor for fixes infections caused by version 5.2. You might want to give the tool a couple minutes to sync across our CDN. Good job , , , !
Reply Retweet Like
Threatpost Jun 18
TOMORROW: A panel of experts will discuss the most costly attacks, how threat actors are honing their skills, and the top tips to avoid an attack in our free Threatpost . REGISTER:
Reply Retweet Like
Alotta_Noyes Jun 11
The best way to prepare employees to stop attacks is to train them. Train new employees at orientation and all employees bi-annually.
Reply Retweet Like
Threatpost Jun 14
With the number of unique incidents continuing to grow, -based attacks in particular are on the rise in 2019, researchers said.
Reply Retweet Like
The NOC Jun 15
Do you know some of the common types of and what to do in the event you encounter it? We can help you .
Reply Retweet Like
Xperteks Computer Consultancy, Inc. 25m
How Ransomware Works? How to Prevent Ransomware Attack and Secure Your Business? If that's what you're searching for, click here -
Reply Retweet Like
Europol Jun 17
JUST RELEASED: 4th decryption tool neutralises latest version of . It is now available for FREE on thanks to a strong cooperation between global law enforcement and private sector! All details here:
Reply Retweet Like
Steve Morgan 19m
Cybersecurity Ventures, a cyber magazine, says that attacks, which infect computers and restrict their access to files, are expected this year to attack a computer every 14 seconds, and every 11 seconds by 2021.
Reply Retweet Like
IT of United States 2h
Are your systems up-to-date? Microsoft discovered a critical flaw in the remote desktop protocol that could allow a hacker to remotely execute the RDP without authorization. will ensure all your systems are up to date and ready to battle with our
Reply Retweet Like
SarahFayHolt Jun 18
“I always advise companies to do a ‘ransomware drill’ simulation. I have seen firms declare it would take them an hour to get back up online, but when tested, it has taken three days or more."
Reply Retweet Like
Cyber Security Jun 17
New variant each file assigns a random extension!Ransom note;README.txt contact email antichrist666@tutamail.com sample VT
Reply Retweet Like

Related searches

#cybersecurity · #dfir · #infosec · #bluekeep · #malware
SonicWall 22h
Ransomware isn't going anywhere; in the past two months multiple cities have been affected and predicts it will get worse before it gets better.
Reply Retweet Like
HelpSystems Jun 18
isn't always about the money. Learn about how threat actors use this as a distraction to get what they truly want.
Reply Retweet Like
CANetworking 35m
The average cost of downtime (loss of productivity) from a single attack is about $46,800.
Reply Retweet Like
CCSI 1h
Smash GandCrab: Free tools released to decrypt files scrambled by notorious ransomware via
Reply Retweet Like
Ludovic R. Jun 17
Our free Threatpost webinar on trends is in two days! A panel of experts will discuss the future of ransomware and how it has evolved. Register today:
Reply Retweet Like
Ehacking 1h
Global ransomware damage costs are predicted to hit $20 billion in 2021, up from $11.5 billion in 2019, $5 billion in 2017, and just $325 million in 2015, according to Cybersecurity Ventures
Reply Retweet Like
Threatpost 4h
Our free webinar on the top threats is TODAY! Join our panel of experts to discuss the top ransomware trends, the most costly attacks, and ways that companies can protect themselves. REGISTER:
Reply Retweet Like