TeslaCrypt 2.0: Cyber Crime Malware Behavior, Capabilities and Communications
TeslaCrypt is a C++ compiled binary that begins encrypting files on infected machines immediately after execution. Notably, this family...
![](https://static.wixstatic.com/media/11c37c_af5b8caabe054a4ebc34df0a22ac2470.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,lg_1,q_30,blur_30,enc_auto/11c37c_af5b8caabe054a4ebc34df0a22ac2470.webp)
![TeslaCrypt 2.0: Cyber Crime Malware Behavior, Capabilities and Communications](https://static.wixstatic.com/media/11c37c_af5b8caabe054a4ebc34df0a22ac2470.jpg/v1/fill/w_319,h_230,fp_0.50_0.50,q_90,enc_auto/11c37c_af5b8caabe054a4ebc34df0a22ac2470.webp)
TorrentLocker Actors Fix Encryption Flaw
Shortly after researchers revealed that TorrentLocker contained an encryption flaw, the attackers modified the code to fix this error....
![](https://static.wixstatic.com/media/11c37c_52bea8e36fd449d49bc981377990f7f5.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/11c37c_52bea8e36fd449d49bc981377990f7f5.webp)
![TorrentLocker Actors Fix Encryption Flaw](https://static.wixstatic.com/media/11c37c_52bea8e36fd449d49bc981377990f7f5.jpg/v1/fill/w_319,h_240,fp_0.50_0.50,q_90,enc_auto/11c37c_52bea8e36fd449d49bc981377990f7f5.webp)
iSIGHT Partners Reveals Operation SMN, Tailgater Team and Axiom Group
Earlier today (Tuesday, October 28th ) iSIGHT Partners proudly participated in the public disclosure of threat intelligence on a prolific...
![](https://static.wixstatic.com/media/11c37c_ae78bd3721f548d88b3ab74df388b4be.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,lg_1,q_30,blur_30,enc_auto/11c37c_ae78bd3721f548d88b3ab74df388b4be.webp)
![iSIGHT Partners Reveals Operation SMN, Tailgater Team and Axiom Group](https://static.wixstatic.com/media/11c37c_ae78bd3721f548d88b3ab74df388b4be.jpg/v1/fill/w_261,h_229,fp_0.50_0.50,q_90,enc_auto/11c37c_ae78bd3721f548d88b3ab74df388b4be.webp)
iSIGHT Partners Discovers 0-Day Being Used by Sandworm Team
On Tuesday, October 14, 2014, iSIGHT Partners – in close collaboration with Microsoft – announced the discovery of a zero-day...
![](https://static.wixstatic.com/media/11c37c_e777e7e7c18d46739d41cde91889f18b.jpg/v1/fill/w_232,h_232,fp_0.50_0.50,lg_1,q_30,blur_30,enc_auto/11c37c_e777e7e7c18d46739d41cde91889f18b.webp)
![iSIGHT Partners Discovers 0-Day Being Used by Sandworm Team](https://static.wixstatic.com/media/11c37c_e777e7e7c18d46739d41cde91889f18b.jpg/v1/fill/w_319,h_166,fp_0.50_0.50,q_90,enc_auto/11c37c_e777e7e7c18d46739d41cde91889f18b.webp)
Analysis of ‘TorrentLocker’ – A New Strain of Ransomware Using Components of CryptoLocker and Crypto
TorrentLocker is a type of ransomware that mimics features from both CryptoLocker and CryptoWall. It is very successful at encrypting...
![Analysis of ‘TorrentLocker’ – A New Strain of Ransomware Using Components of CryptoLocker and Crypto](https://static.wixstatic.com/media/11c37c_3c6c1fd0f080499c983023868302566d.webp)
How to bypass Zeus Trojan’s self protection mechanism ~ by Raashid Bhat
Spammers are good when it comes to intimidating users to open the attachment . One of the recent pathetic and cruel one was Hi A Person...
![](https://static.wixstatic.com/media/11c37c_95ae68d08ac24fb4bee3ab7dd538a7e0.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/11c37c_95ae68d08ac24fb4bee3ab7dd538a7e0.webp)
![How to bypass Zeus Trojan’s self protection mechanism ~ by Raashid Bhat](https://static.wixstatic.com/media/11c37c_95ae68d08ac24fb4bee3ab7dd538a7e0.jpg/v1/fill/w_319,h_240,fp_0.50_0.50,q_90,enc_auto/11c37c_95ae68d08ac24fb4bee3ab7dd538a7e0.webp)
How to Become a Certified Malware Analysis Expert
INTRODUCTION: Cyber Security, a term more commonly used in today’s ever-present battle to defend companies, governments, and personal...