A method to decrypt Petya Ransomware encrypted hard drives have been discovered. Using a special site and tools, it is now possible to extract data from the encrypted drive that can then be used to ...
Fog ransomware hackers are using an uncommon toolset, which includes open-source pentesting utilities and a legitimate employee monitoring software called Syteca. The Fog ransomware operation was ...
A ransomware variant favored by a pro-Russia hacktivist group is back on the scene with a new version that has a fatal flaw — it keeps artifacts that allow victims to decrypt their files. VolkLocker ...