The cybercriminals behind Locky ransomware have adopted a new DDE hijacking technique to infect as many victims as possible while evading detection.
The cybercriminals behind the Necurs botnet are now taking screenshots of victims' machines to improve the performance of ransomware attacks.
Locky ransomware is a rising threat again as millions of spam emails have been sent out in a new series of attacks.
Jaff ransomware is a new variant from the authors of Locky. It works in a similar manner, but is much more expensive for its victims.
Since its initial launch five years ago, the Necurs botnet has quickly ascended the cybercriminal ranks. Today, it controls more than 6 million endpoints.
According to recent reports, Cerber ransomware dominated the malware marketplace in the first months of 2017, reducing Locky to irrelevance.
Researchers recently discovered a new strain of ransomware, Spora, that allows victims to select tiered options in a slick, user-friendly payment process.
Security researcher Bart Blaze discovered that cybercriminals have been spreading Locky ransomware using the Facebook Messenger app.
The challenge of protecting your brand is growing as ransomware and other targeted attacks become increasingly frequent and complex.
According to the most recent Proofpoint threat report, nearly 97 percent of malicious emails observed in Q3 2016 contained Locky ransomware.