Test subject – GlobeImposter ransomware This GlobeImposter ransomware is delivered as a java script via email campaigns and bypasses classic antivirus detection technologies.…
File monitoring is an internal audit process of automatically observing and recording important aspects regarding how files are being accessed…
When it comes to ransomware detection, targeted ransomware attacks are very difficult to identify through classic anti-virus technology. Although such…
Test subject – PowerShell ransomware This PowerShell ransomware variant is particularly dangerous because it bypasses conventional anti-malware tools and renders…
Test subject – Oxar, a HiddenTear variant Oxar is a HiddenTear variant with a highly destructive potential. It features anti-debugging…
Anti-ransomware software supports your disaster recovery plan and protects files and backups and so it is a great addition to…
Lately, there is a lot of disagreement related to why people who have various types of antivirus solutions in place,…
Less than two months ago, WannaCry made the headlines as the most destructive malware in the history. This time the…
Sorebrect case subject – fileless ransomware This variant arrives as a text file with a name that tricks the users into…