Dutch cybersecurity firm Tesorion has released a free decryptor for the Lorenz ransomware, allowing victims to recover some of their files for free without paying a ransom. Lorenz is a human-operated ...
A new 'White Phoenix' ransomware decryptor allows victims to partially recover files encrypted by ransomware strains that use intermittent encryption. Intermittent encryption is a strategy employed by ...
Romanian cybersecurity firm Bitdefender has released a free decryption tool for MortalKombat, a months-old strain of ransomware targeting predominantly cryptocurrency users. MortalKombat, named after ...
Cybersecurity analysts have released a decryptor for BianLian ransomware that could allow victims to retrieve their encrypted files for free -- and avoid paying a ransom demand to cyber criminals.
On June 3, Spain-based telecommunications conglomerate, Telefónica, released a free tool to recover data encrypted by the VCryptor ransomware. The tool, VCrypt Decryptor, was created as part of an ...
A new type of PC ransomware hit users a couple of weeks ago and it's some of the most dangerous malware of its kind. While previous ransomware apps would encrypt just specific personal data on a ...
Ransomware started out many years as scams where users were being tricked into paying fictitious fines for allegedly engaging in illegal online behavior or, in more serious cases, were blackmailed ...
Creators behind Zorab ransomware launched a fake tool that double-encrypts files affected by the attack. As free ransomware decryptor tools begin to enter the market, a wave of fake software that ...
Ransomware makes use of intermittent encryption to bypass detection algorithms Your email has been sent Most cybercriminals running ransomware operations are under the spotlight. Not only are they ...
A team of malware developers is preparing to sell a new ransomware program that encrypts files on infected computers and asks victims for money to recover them, according to a volunteer group of ...
The ransomware family’s abuse of Polygon smart contracts echoes techniques recently seen in Ethereum-based attacks.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results