Search Results for:  – Page 86
Ransomware
Ransomware

CONTI Ransomware

In May of this year, the FBI released an alert about the considerable increase in attacks carried out by the Conti Ransomware. They use the RaaS (Ransomware as a Service), which is a way of outsourcing the spread of this ransomware, amplifying the number of attacks exponentially. They are evolving this type of service, instead of paying just a commission

READ MORE →
PYSA
Ransomware

PYSA Ransomware Cyber ​​Attacks

The PYSA (Protect Your System Amigo) Ransomware or Mespinoza Ransomware has been operating effectively on the internet for a long time. He is famous for numerous attacks. So much so that the FBI has released a warning of the dangers of this ransomware. It has been in operation since December 2019 and remains active today. In order to pressure victims

READ MORE →
BlackMatter
Ransomware

BlackMatter Ransomware

After the successful attacks made by the Darkside Ransomware on the Colonial Pipe and the REvil Sodinokibi Ransomware on Kaseya, both ended their operations. This opened a gap for new ransomware extensions to appear in order to protagonists in the new attacks and in the so-called Ransomware as a Service (RaaS) which is the outsourcing of attacks. From this gap,

READ MORE →
REvil Sodinokibi

REvil Sodinokibi Ransomware

One of the biggest hacker attacks in recent years affected the IT systems of many companies. Up to 1,500 companies worldwide were affected, explains US IT service provider Kaseya, whose software served as the gateway to ransomware. It is very likely that the number of unreported cases is much higher, as many companies fear damage to their image. A vulnerability

READ MORE →
Ransomware
Ransomware

LockBit 2.0 Ransomware

Digital Recovery through several years of experience has developed exclusive technologies capable of recovering data encrypted by any ransomware, generally without paying the ransom amount and without the ransomware decryption key. Don’t be taken in by the so-called experts who, due to a lack of know-how, insist that data recovery is only possible with the help of hackers and that

READ MORE →
Récupérer le Ransomware Makop
Ransomware

Makop Ransomware

The Makop ransomware has grown through its affiliate programme, RaaS (Ransomware as a Service), a tactic that aims to find partners to carry out attacks by taking only a commission on the value of the ransomware. This tactic aims to expand the attacks by bringing fame to the group. The main target of this group has been South Korean companies,

READ MORE →
Intercobros Ransomware
Ransomware

Intercobros ransomware

Intercobros Ransomware is a new group that has emerged, but has not presented anything new compared to all the other groups.  Intercobros follows the same pattern of hacking, encrypting, extracting, and charging a ransom fee. That is the playbook of every ransomware group. But make no mistake, Intercobros ransomware is a real risk to any company or people, the group carries

READ MORE →
Avos Linux Ransomware
Ransomware

Avos Linux Ransomware

Avos Linux ransomware is a new update of the Avos Locker ransomware, this new version targets the Linux operating system and specifically Vmware ESXi servers. There have already been numerous attacks recorded from this new variation of Avos Locker, one of the ransomware requested by the group has reached $1 million. The group is targeting large corporations with targeted attacks. Many ransomware

READ MORE →
Data Storage

The Real Size of a Yottabyte

After Edward Snowden made the accusation that the US National Security Agency (NSA) was spying on companies around the world, including Petrobras in Brazil, several reports from various places around the world, including Brazil, targeted the US agency. To understand better see this Fantástico report published on 15/09/2013. As shown in the above report, the United States National Security Agency

READ MORE →

Through unique technologies Digital Recovery can bring back encrypted data on any storage device, offering remote solutions anywhere in the world.

Discover the invisible vulnerabilities in your IT – with the 4D Pentest from Digital Recovery