WannaRen Decryption Tool

WannaRen Decryption Tool

A decryptor for the WannaRen ransomware is now available for download. Initially spotted in April 2020, WannaRen is mostly spreading through websites offering “cracked” software. This new decryptor works on all known versions of WannaRen ransomware. How to use this tool Step 1: Download the decryption tool below Save it ... Read More
Towards a Universal Security Solution against Bluetooth Low Energy Attacks

Towards a Universal Security Solution against Bluetooth Low Energy Attacks

For the past couple of years, Bluetooth has become the de-facto standard in low-range communication, with a particular impact on smart home and IoT development. From smart speakers to smart lights and everything in between, Bluetooth makes connectivity and communication as easy as pressing a button. Over the years, the ... Read More
GoGoogle Decryption Tool

GoGoogle Decryption Tool

We’re happy to announce the availability of a new decryptor for GoGoogle (aka BossiTossi) ransomware. This family of ransomware is written in Go and generates encrypted files with the .google extension. Spotted in April 2020, GoGoogle ransomware has several peculiarities. First of all, it is written in Golang, a programming ... Read More
Shade / Troldesh Ransomware decryption tool

Shade / Troldesh Ransomware decryption tool

We have just released an updated decryption tool for Shade (Troldesh) Ransomware. As a long-established family of ransomware, Shade has been in operation since 2014, and has been operating consistently ever since. In late April 2020, its operators announced that they are stopping the Shade operation and publicly released around ... Read More
Severe Vulnerability in iBaby Monitor M6S Camera Leads to Remote Access to Video Storage Bucket

Severe Vulnerability in iBaby Monitor M6S Camera Leads to Remote Access to Video Storage Bucket

Baby monitors have become increasingly common in modern homes. To many parents, the ability to keep an eye on children while away is worth the risk of having video feeds or pictures leaked to unauthorized parties. This article – part of a series developed in partnership with PCMag – aims ... Read More
Paradise Ransomware decryption tool

Paradise Ransomware decryption tool

We’re happy to announce a new decryptor for Paradise Ransomware. Paradise Ransomware, initially spotted in 2017, has been aggressively marketed as a service to interested affiliates. After infection, it checks whether the keyboard language is set to Russian, Kazakh, Belarus or Ukrainian and, if so, exits without encrypting. Otherwise, it ... Read More
Multiple Vulnerabilities in Belkin WeMo Insight Switch

Multiple Vulnerabilities in Belkin WeMo Insight Switch

Internet of Things devices have become commonplace in modern homes. Relatively inexpensive and easy to control remotely, they promise a world at your fingertips. Security vulnerabilities in connected devices can not only affect the user experience but can also give cyber-criminals an open door to your local network. This is ... Read More
Ring Video Doorbell Pro Under the Scope

Ring Video Doorbell Pro Under the Scope

This article – part of a series developed in partnership with PCMag – aims to shed some light about the security of world’s best-sellers in the IoT space. PCMag contacted the research team at Bitdefender and asked us to have a look at several popular devices, including the Ring Video ... Read More
Ouroboros Ransomware decryption tool

Ouroboros Ransomware decryption tool

Ouroboros ransomware has been around for more than a year in various forms, operated by different cybercrime groups. Ouroboros, known to spread via Remote Desktop Protocol bruteforce attacks and deceptive downloads, has claimed a significant number of victims worldwide. We’re now happy to announce the availability of a new decryptor ... Read More
Wrapping up the 2019 PwnThyBytes CTF

Wrapping up the 2019 PwnThyBytes CTF

| | ctf, Miscellaneous
Here we are at the end of the first edition of the PwnThyBytes Capture The Flag Competition. We hope it was a challenging, learning and intriguing experience for all teams that took part. As organizers, we can say it certainly was for us. Without further ado, here are the winners ... Read More
Loading...