<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1018517621595528&amp;ev=PageView&amp;noscript=1">
Stats & Trends

WannaCry Follow-up Attacks: 3 New Outbreak Scenarios to Be Ready For

It's been a little over a week since the WannaCry ransomware worm swept onto the scene, infecting an estimated 300,000 computers in more than 150 countries. Now that the initial dust has settled a...

Read More
Featured
Barkly vs Malware

Blocking Dharma Ransomware Before it Encrypts Files

Dharma ransomware overview Dharma made its first appearance in November 2016, shortly after the master decryption keys for CrySiS ransomware were...

Read More
Apr 2017
Barkly vs Malware

Blocking Revenge Ransomware During Runtime

Revenge Ransomware Overview Revenge was first spotted in March 2017 being delivered via the RIG exploit kit. As Bleeping Computer's Lawrence...

Read More
Apr 2017
Barkly vs Malware

Blocking Satan Ransomware During Runtime

Thanks to its availability as a ransomware-as-a-service (RaaS) platform, Satan ransomware is bringing digital extortion capabilities to the...

Read More
Mar 2017
Barkly vs Malware

Blocking Spora Ransomware During Runtime

Spora Ransomware Overview Spora was first spotted in early January 2017 and immediately began generating buzz in the research community, thanks...

Read More
Mar 2017
Barkly vs Malware

Stopping Cerber Ransomware During Runtime

Cerber Ransomware Overview Since its first appearance in February 2016, Cerber has become one of the most active ransomware families. Its growth...

Read More
Mar 2017
Barkly vs Malware

Stopping PowerShell Attacks that Bypass Antivirus: Mimikatz and "Mimidogz"

Black Hills researcher shows how even the simplest disguises can be enough to bypass AV.

Read More
Jan 2017