If you are affected by this ransomware, consider not paying the ransom
Amcache and Shimcache in forensic analysis
Data from Amcache and Shimcache can provide a timeline of whether, what program was executed, when it was first launched and last modified.
Forensic Artifacts: proof of program execution on Windows systems
During forensic analysis of a Windows system, it is often important to understand, when and how a specific process was started.
Attention! Victims of the [email protected] ransomware
Decrypting files after WannaCash ransomware (.punisher)
Decoding some versions of Cryakl
Specialists and Internet resources of the VIRUSNET ASSOCIATION
Current list of resources and users included in the Association.
Charter of the VIRUSNET Association
Non-profit voluntary
ASSOCIATION OF COMPUTER AND NETWORK SECURITY CONSULTANTS
Decrypting files after cryakl ver-CL 1.5.1.0
note: Transcription service is provided free of charge on a first-come, first-served basis..
Mail hacking or porn blackmail on $864
Fraudsters are becoming more sophisticated, Porn blackmail is now trending, when the user receives a sent message “on behalf of” your own mailbox with content: Hello! I’m a hacker who cracked your email and device a few months ago. You entered a password Read More …