When the cryptolocker strikes: Reasons for ransomware success and ways to prevent

Cybersecurity malware cryptolocker

At a public sector customer’s site, our shared project mail account received a quite legitimate-looking email with an invoice in a .docm document and a request to verify its contents. The sender seemed to be a lady employed at the customer’s organization. But at second look, something was wrong with it. She was not employed there, […]