File monitoring is an internal audit process of automatically observing and recording important aspects regarding how files are being accessed…
When it comes to ransomware detection, targeted ransomware attacks are very difficult to identify through classic anti-virus technology. Although such…
Test subject – PowerShell ransomware This PowerShell ransomware variant is particularly dangerous because it bypasses conventional anti-malware tools and renders…
Test subject – Oxar, a HiddenTear variant Oxar is a HiddenTear variant with a highly destructive potential. It features anti-debugging…
Anti-ransomware software supports your disaster recovery plan and protects files and backups and so it is a great addition to…
Lately, there is a lot of disagreement related to why people who have various types of antivirus solutions in place,…
Less than two months ago, WannaCry made the headlines as the most destructive malware in the history. This time the…
Sorebrect case subject – fileless ransomware This variant arrives as a text file with a name that tricks the users into…
Most people do not know where all their important files are, and this makes detecting data breaches tad difficult. To…