Hunting for Ransomware with Powershell

  This is part 2 of the series on remote IOC scanning with Powershell. We left off with our script being able to scan remotely for the existence of files and registry keys. The limitation we had so far was that when we specified registry keys in the HKEY_CURRENT_USER hive …

Petya Ransomware: a new approach to messing up your files

A new kind of ransomware has been noticed recently. It’s called Petya (according to Wikipedia this is a Bulgarian female given name or a Russian diminutive for the male given name Piotr). The Petya ransomware takes a whole new approach to messing up your computer. Unfortunately this new crypto takes …

7 Hot Tips To Destroy Your Business Quickly and Efficiently aka How To Get Hacked

Want to have some laughs at work ? As in : “Hahaha, remember when we got breached Bob ? You should’ve seen the look on our boss’ face!”  Want to learn how to get “Pwned” quickly ? You’ve come to the right address, because Cyberforce.be is offering you some piping …

When Malware Gets Up In Your Cloud

Many people utilizing cloud computing, whether for storage or for actual computing,  believe that they are immune for viruses.  However, that is not the case.  An interesting story from  Krebsonsecurity.com reported that a company had all its files on the cloud server infected by ransomware. The problem started when an …