TOPransom: From eMail Attachment to Powning the Attacker’s Database
Hi folks, today I want to share a quick but intensive experience in fighting cybercrime. I wish you would appreciate the entire process from getting an email attachment to powning the ransom server trying to stop the infection and to alert everybody about the found threats. As a second step I would try to identify […]
Read more "TOPransom: From eMail Attachment to Powning the Attacker’s Database"