Cruddy cryptography means victims whose files have been encrypted by the Ukraine-tormenting ransomware can break the chains without paying extortionists. A...
Reading Time: 3 minutesOverviewOne of thefirst times the public witnessedfirsthandand realized the power of ransomware was when WannaCry broke out in 2017....
Reading Time: 6 minutesComodo Cyber Security team reveals the inner-workings of the latest strain of this persistent threatThe Comodo Cyber Security team...
Reading Time: 5 minutesThe arms race between cybercriminals and cybersecurity warriors is increasing at an enormous speed. Malware authors immediately react on...
Reading Time: 4 minutesComodo Threat Intelligence Lab discovered a new October phishing campaign with the infamous IKARUSdilapidated Locky ransomware payload, marking the...
Reading Time: 4 minutesShould you fear your office scanner/printer? How about your post office?A second wave of new but related IKARUSdilapidated Locky...