Posted incybersecurity Data Breaches Endpoint Security
Wormable MountLocker
XingLocker a Ransomware group, is actively using a customized MountLocker ransomware executable. This latest MountLocker operation uses Windows Active Directory APIs to propagate as a worm through networks. Actuallist A…



