<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Malware Archives - Aditi Group Managed IT &amp; Consulting</title>
	<atom:link href="https://aditigroup.com/category/security-alert/malware/feed/" rel="self" type="application/rss+xml" />
	<link>https://aditigroup.com/category/security-alert/malware/</link>
	<description>IT Privacy • Protection • Productivity</description>
	<lastBuildDate>Wed, 10 Apr 2024 20:27:26 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://aditigroup.com/data-privacy/wp-content/uploads/cropped-aditi-group-icon-512-t-32x32.png</url>
	<title>Malware Archives - Aditi Group Managed IT &amp; Consulting</title>
	<link>https://aditigroup.com/category/security-alert/malware/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>What&#8217;s the Score? National Vulnerability Database</title>
		<link>https://aditigroup.com/whats-the-score-national-vulnerability-database/</link>
		
		<dc:creator><![CDATA[computer service]]></dc:creator>
		<pubDate>Wed, 10 Apr 2024 20:27:26 +0000</pubDate>
				<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security Alert]]></category>
		<category><![CDATA[Security Learning]]></category>
		<category><![CDATA[National Institute of Standards and Technology]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NVD]]></category>
		<category><![CDATA[rating]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[severity]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=1137</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/whats-the-score-national-vulnerability-database/">What&#8217;s the Score? National Vulnerability Database</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Weakness Scoring System</h2>
<p>Our Federal government division witin the Department of Commerce, under the National Institute of Standards and Technology, NIST, has a <strong>National Vulnerability Databaase</strong> designed to help the public, and especially the technical administrators of IT systems to guage potential weaknesses or vulnerabilities in software and hardware systems.  </p>
<p>&nbsp;</p></div>
			</div><div class="et_pb_module et_pb_image et_pb_image_0">
				
				
				
				
				<a href="https://aditigroup.com/data-privacy/wp-content/uploads/NIST-national-vulnerability-database-page-2400.png" class="et_pb_lightbox_image" title="NATIONAL VULNERABILITY DATABASE"><span class="et_pb_image_wrap "><img fetchpriority="high" decoding="async" width="2400" height="1350" src="https://aditigroup.com/data-privacy/wp-content/uploads/NIST-national-vulnerability-database-page-2400.png" alt="NATIONAL VULNERABILITY DATABASE" title="NIST-national-vulnerability-database page-2400" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/NIST-national-vulnerability-database-page-2400.png 2400w, https://aditigroup.com/data-privacy/wp-content/uploads/NIST-national-vulnerability-database-page-2400-1280x720.png 1280w, https://aditigroup.com/data-privacy/wp-content/uploads/NIST-national-vulnerability-database-page-2400-980x551.png 980w, https://aditigroup.com/data-privacy/wp-content/uploads/NIST-national-vulnerability-database-page-2400-480x270.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) and (max-width: 1280px) 1280px, (min-width: 1281px) 2400px, 100vw" class="wp-image-1139" /></span></a>
			</div><div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>NIST has been working with private industry and other public sector organizations to rate and maintain a catalog of IT threats.   Originally started in 1999 under another name, and as an effort between NIST, SANS institute, and othrs, under the name ICAT or Internet Category Attack Toolkit.  It evolved and even faced death by lack of budgets until rebranded as NVD in 2005 and supported more fully.  </p></div>
			</div><div class="et_pb_module et_pb_blurb et_pb_blurb_0  et_pb_text_align_left et_pb_blurb_position_top et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_blurb_content">
					<div class="et_pb_main_blurb_image"><span class="et_pb_image_wrap et_pb_only_image_mode_wrap"><img decoding="async" width="1199" height="873" src="https://aditigroup.com/data-privacy/wp-content/uploads/example-NVD-CVE-2021-46938.png" alt="example NVD score 7.8" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/example-NVD-CVE-2021-46938.png 1199w, https://aditigroup.com/data-privacy/wp-content/uploads/example-NVD-CVE-2021-46938-980x714.png 980w, https://aditigroup.com/data-privacy/wp-content/uploads/example-NVD-CVE-2021-46938-480x349.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1199px, 100vw" class="et-waypoint et_pb_animation_top et_pb_animation_top_tablet et_pb_animation_top_phone wp-image-1145" /></span></div>
					<div class="et_pb_blurb_container">
						<h4 class="et_pb_module_header"><span>Example: 7.8 Severity Linux Vulnerability</span></h4>
						<div class="et_pb_blurb_description"><p>This page is an excellent example of the use, and also of how technical it is.  <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46936">https://nvd.nist.gov/vuln/detail/CVE-2021-46936</a></p></div>
					</div>
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://aditigroup.com/whats-the-score-national-vulnerability-database/">What&#8217;s the Score? National Vulnerability Database</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Malvertising Ransonware &#8211; Don&#8217;t Click on That Ad</title>
		<link>https://aditigroup.com/malvertising-ransonware-dont-click-on-that-ad/</link>
		
		<dc:creator><![CDATA[computer service]]></dc:creator>
		<pubDate>Wed, 23 Mar 2016 21:02:15 +0000</pubDate>
				<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security Alert]]></category>
		<category><![CDATA[data encryption]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[mavertising]]></category>
		<category><![CDATA[ransom]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">http://aditigroup.com/data-privacy/?p=11</guid>

					<description><![CDATA[<p>Major websites were hit by a &#8220;malvertising&#8221; attack that hijacked people&#8217;s computers and demanded ransom. Something else to fear.  Yes, just when you thought web advertising couldn&#8217;t be more annoying with slow page loading, pop-ups in the middle of that interesting article and more Viagra than you ever care the know about&#8230;comes Malvertising ransomware. And [&#8230;]</p>
<p>The post <a href="https://aditigroup.com/malvertising-ransonware-dont-click-on-that-ad/">Malvertising Ransonware &#8211; Don&#8217;t Click on That Ad</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Major websites were hit by a &#8220;malvertising&#8221; attack that hijacked people&#8217;s computers and demanded ransom.</em></p>
<p>Something else to fear.  Yes, just when you thought web advertising couldn&#8217;t be more annoying with slow page loading, pop-ups in the middle of that interesting article and more Viagra than you ever care the know about&#8230;comes Malvertising ransomware.</p>
<p>And it came in a big way as major websites that we trust and visit daily were hit by dangerous software hidden in advertisements.  This software is a form of <em><strong>ransonware</strong></em> which encrypts data and holds it hostage &#8211; for a price.</p>
<p>Were you hit already?  If so, the authorities say you&#8217;ll just have to pay up if you want your data back.</p>
<p>Read more &gt; <a href="http://www.cnet.com/news/new-york-times-bbc-dangerous-ads-ransomware-malvertising/">http://www.cnet.com/news/new-york-times-bbc-dangerous-ads-ransomware-malvertising</a></p>
<p>The post <a href="https://aditigroup.com/malvertising-ransonware-dont-click-on-that-ad/">Malvertising Ransonware &#8211; Don&#8217;t Click on That Ad</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Locky Ransomware &#8211; Data Lockout</title>
		<link>https://aditigroup.com/locky-ransonware/</link>
		
		<dc:creator><![CDATA[Security Expert]]></dc:creator>
		<pubDate>Tue, 16 Feb 2016 22:11:56 +0000</pubDate>
				<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security Alert]]></category>
		<category><![CDATA[computer encryption]]></category>
		<category><![CDATA[data destruction]]></category>
		<category><![CDATA[erase]]></category>
		<category><![CDATA[Locky]]></category>
		<category><![CDATA[payment]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[wipe out]]></category>
		<guid isPermaLink="false">http://aditigroup.com/data-privacy/?p=13</guid>

					<description><![CDATA[<p>Network Admins and network users beware&#8230; Have you heard about the new Locky ransomware? It encrypts your data on network shares using AES encryption even when they aren&#8217;t mapped. Locky changes filenames for encrypted files to make it more difficult to restore the right data. Hollywood Presbyterian Medical Center paid hackers about $17,000 worth in Bitcoin. And reporters [&#8230;]</p>
<p>The post <a href="https://aditigroup.com/locky-ransonware/">Locky Ransomware &#8211; Data Lockout</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Network Admins and network users beware&#8230; Have you heard about the new Locky ransomware? It encrypts your data on network shares using AES encryption <strong>even when they aren&#8217;t mapped</strong>. Locky changes filenames for encrypted files to make it more difficult to restore the right data.</p>
<p>Hollywood Presbyterian Medical Center paid hackers about $17,000 worth in Bitcoin. And reporters at Forbes say Locky is infecting up to <strong>90,000 network systems every day</strong>.</p>
<p style="padding-left: 60px;"><em>When Locky encrypts a file it will rename the file to the format <strong>[fusion_builder_container hundred_percent=&#8221;yes&#8221; overflow=&#8221;visible&#8221;][fusion_builder_row][fusion_builder_column type=&#8221;1_1&#8243; background_position=&#8221;left top&#8221; background_color=&#8221;&#8221; border_size=&#8221;&#8221; border_color=&#8221;&#8221; border_style=&#8221;solid&#8221; spacing=&#8221;yes&#8221; background_image=&#8221;&#8221; background_repeat=&#8221;no-repeat&#8221; padding=&#8221;&#8221; margin_top=&#8221;0px&#8221; margin_bottom=&#8221;0px&#8221; class=&#8221;&#8221; id=&#8221;&#8221; animation_type=&#8221;&#8221; animation_speed=&#8221;0.3&#8243; animation_direction=&#8221;left&#8221; hide_on_mobile=&#8221;no&#8221; center_content=&#8221;no&#8221; min_height=&#8221;none&#8221;][unique_id][identifier].locky </strong>and creates ransom notes called <strong>_Locky_recover_instructions.txt.</strong></em></p>
<p><strong>So, please, BACKUP your data!</strong></p>
<p>&gt; <a href="http://www.forbes.com/sites/thomasbrewster/2016/02/18/ransomware-hollywood-payment-locky-menace/#2e6444fc75b0" target="_blank" rel="noopener noreferrer">Read more</a>[/fusion_builder_column][/fusion_builder_row][/fusion_builder_container]</p>
<p>The post <a href="https://aditigroup.com/locky-ransonware/">Locky Ransomware &#8211; Data Lockout</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
