Microsoft Exchange exploits – step one in ransomware chain

Microsoft Exchange exploits – step one in ransomware chain

Once attackers gain a foothold on web servers, there are all manner of nasty tricks and malware they can leverage immediately or put into play later – like ransomware.Since the research blogpost – Exchange servers under siege from at least 10 APT groups – ESET has...
Ransomware in a virtual environment

Ransomware in a virtual environment

Several cybercriminal groups have exploited vulnerabilities in VMware ESXi to infect computers with ransomware. Although it significantly reduces some cyberthreat risks, virtualization is no more a panacea than any single other practice. A ransomware attack can still...