WannaCrypt Ransomware: Protecting your computers against the latest ransomware

Over the past few days, many businesses have reported infections from the latest round of ransomware called WannaCrypt. This massive cyberattack is likely to have stemmed from stolen tools used by the National Security Agency (NSA). Due to the rate of infection, and the number of machines being infected by WannaCrypt, Microsoft has released an […]

Continue reading


The Latest Ransomware Craze – Holding MongoDB Databases Hostage

As if our jobs as IT admins isn’t difficult enough, hackers have taken to finding misconfigured MongoDB databases, and are holding them hostage, until a ransom has been paid. Similar to traditional ransomware, where files on a computer are encrypted until a fee has been paid, databases, are being held hostage, instead. The modus operandi […]

Continue reading


Blocking Ransomware Scripts with Exchange Transport Rules

One of the current tactics ransomware authors are using to infect your network, is to send email attachments containing malicious scripts. These scripts are often VBScript (.vbs), Windows Script Files (wsf), or JavaScript (.js) files, and when executed, will download a DLL or EXE to spawn the infection. An example JavaScript which downloads and executes […]

Continue reading


Got Apple Quicktime installed on your computer? Uninstall it immediately, says Department of Homeland Security

A recent report from TrendMicro/ZDI stated that Apple has ceased development of Apple Quicktime, and has also revealed two critical vulnerabilities under their Zero Day Initiative. These two vulnerabilities are considered “remote code execution” vulnerabilities, which means a miscreant could get the victim to click on a link or visit a website, and can remotely […]

Continue reading


Actors behind Dridex launch another spam campaign, delivering Locky Ransomware

Recent reports have indicated that the actors behind Dridex, originally a banking Trojan distributor, have switched tactics, and are now heavily pushing out a new ransomware called Locky. The current method of distribution is via a spam email, which contains a Word document. Additional reports have stated that it is being distributed via the Neutrino […]

Continue reading