The latest Nemucod ransomware variant, dubbed NemucodAES, is trying to make a mark. Emsisoft’s free decrypter is here to help free your files.
Category Archives: Emsisoft Lab
Concerned about #WannaCry ransomware? Never fear, the Emsisoft Malware Lab are here to explain all you need to know about this latest ransomware outbreak.
WCry ransomware is the latest global outbreak that is using known NSA exploits to attack systems. Here’s all you need to know and how to stay protected.
Emsisoft released a free decrypter to remove the Delphi-based Amnesia ransomware from infected systems.
Emsisoft released a free decrypter to remove Cry 128 ransomware, the newest strain from the CryptON family (including Cry9, X3M and Nemesis variants) from infected systems.
Emsisoft released a free decrypter to remove the newest strain of CryptON ransomware (including Cry9, X3M and Nemesis variants) from infected systems.
We address recent media attention around whether antivirus software poses a threat to users’ safety because it intercepts encrypted HTTPS online traffic, and why Emsisoft customers do not need to worry.
Today, Emsisoft CTO/researcher Fabian Wosar released a new version of the Emsisoft Globe Ransomware Decrypter that can recover files locked by the latest version of this threat that made its presence felt for the first time during the summer of 2016.
Emsisoft researcher Fabian Wosar has created a decrypter for the newly discovered OpenToYou ransomware that will allow infected victims to recover encrypted files without needing to pay a ransom.
Emsisoft announces the release of Emsisoft Emergency Kit Version 12. Updated features include an improved scanning engine and an updated user interface.
Emsisoft announces the release of its version 3.0 edition of Emsisoft Mobile Security. Major updates include: streamlined operation without taking up processing power, improved security features and heightened detection capabilities.
BleepingComputer has long been working on helping users effected by CryptXXX Ransomware. This week, they published an article uncovering a bug on the CryptXXX ransomware’s payment server where victims are logging in and receiving their decryption key for free.
A scam-chatbot approached our CEO via Skype and revealed some interesting facts how their business works.
A variant of the Radamant ransomware uses the domain name “emisoftsucked” and strings such as emisoft f**kedbastardsihateyou in the code. You have to see this!