Cryptomining Is Overtaking Ransomware as Most Popular Cybercrime Malware

Skybox® Security, a global leader in cybersecurity management, announced today the release of its mid-year update to the Vulnerability and Threat Trends Report which analyzes vulnerabilities, exploits and threats in play. The report, compiled by the team of security analysts at the Skybox® Research Lab, aims to help organizations align their security strategy with the reality …

Transportation industry vulnerable to Ransomware and IOT attacks

New study has found that Cyberattacks leveraging IoT devices are also becoming commonplace particularly in the transportation where 29 percent of companies indicated they experienced an IoT attack. The energy, construction, and IT sectors aren’t far behind 22 percent of respondents from each industry reported attacks, respectively. To combat these threats researchers said companies will …

Almost half of UK businesses would pay ransom following an attack

UK businesses are most likely to pay up following a ransomware attack, new figures have claimed. Research by security firm Malwarebytes found that almost half (49 per cent) of UK businesses would pay ransom following a ransomware attack. Globally, the figure sits somewhat lower, at 42 per cent, according to Malwarebytes’ “Second Annual State of …

WannaCry ransomware affects over 150 countries, Africa least hit

On Friday 12th May, organizations across the world were hit by a massive ransomware attack, named WannaCry, which exploited a (now patched) Microsoft Windows vulnerability revealed in the Shadowbrokers dump on April 14. This latest variant of ransomware  according to Avast Security data,  is mainly being targeted to Russia, Ukraine and Taiwan, but the ransomware …

Ransomware variant Samas RansomWorm is wreaking havoc on unsuspecting computers

Samas RansomWorm, a ransomware variant  is infiltrating unsuspecting machines, gaining its name from its unusual propagation characteristics. Whereas traditional ransomware only encrypts the machine the attacker is controlling, RansomWorm propagates inside throughout the entire network to encrypt every server and computer—and the backups. According to research from Javelin Networks, it executes what it calls the …