Dutch cybersecurity firm Tesorion has released a free decryptor for the Lorenz ransomware, allowing victims to recover some of their files for free without paying a ransom. Lorenz is a human-operated ...
Researchers have created a decryptor that exploits a flaw in Black Basta ransomware, allowing victims to recover their files for free. The decryptor allows Black Basta victims from November 2022 to ...
Victims of the CoinVault ransomware might be able to decrypt their files with a free tool released by Kaspersky Lab together with the Dutch police. The tool can be found at ...
Romanian cybersecurity firm Bitdefender has released a free decryption tool for MortalKombat, a months-old strain of ransomware targeting predominantly cryptocurrency users. MortalKombat, named after ...
Couldn't figure out a better forum for this. Hopefully soon I'll have some money to buy a low-end NAS that I can use for backups which I can make a little safer than a connected USB drive, in terms of ...
Cybersecurity analysts have released a decryptor for BianLian ransomware that could allow victims to retrieve their encrypted files for free -- and avoid paying a ransom demand to cyber criminals.
Ransomware started out many years as scams where users were being tricked into paying fictitious fines for allegedly engaging in illegal online behavior or, in more serious cases, were blackmailed ...
Victims of MegaCortex ransomware attacks can now decrypt their files without giving into the ransom demands of cyber criminals, thanks to a free decryption tool that's been released following ...
The Ragnarok ransomware gang has shut down its operations and wiped its leak site clean without providing a reason behind the decision. More importantly, the ransomware gang has left behind a master ...
Some users whose computers have been infected with a ransomware program called TeslaCrypt might be in luck: security researchers from Cisco Systems have developed a tool to recover their encrypted ...
A new ransomware strain is implementing a troubling but so far relatively rarely used technique to encrypt data in a target environment. Instead of encrypting files on endpoint systems like most ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results