THREAT REMOVAL

.ndpyhss Files Virus (Magniber Ransomware) – Remove + Decrypt Data

This article has been created in order to best explain what is the .ndpyhss files virus and how to remove it from your computer, plus how to restore .ndpyhss encrypted files.

The .ndpyhss files virus is the type of ransomware which is from the Magniber viruses, using Magniber exploit kit to conduct it’s infection. The virus aims to encrypt the files on the computers that are infected by it, leaving behind the .ndpyhss file suffix and making the files to no longer able to be opened. The end goal of the ransomware is to get the victims to pay a ransom in order to get the crooks to recover the files, encrypted by this infection. However, this is highly inadvisable and if your computer has been infected by this variant of Magniber ransomware, we advise that you read this article and learn how to remove this virus from your PC and restore files, encrypted by it.

Threat Summary

Name Magniber Ransomware
Type Ransomware, Cryptovirus
Short Description Aims to encrypt the files on your computer and then ask you to pay a hefty ransom fee in order to get the files recovered and working again.
Symptoms Files are encrypted with an added file extension – .ndpyhss and a ransom note file, called README.txt.
Distribution Method Spam Emails, Email Attachments, Executable files
Detection Tool See If Your System Has Been Affected by malware

Download

Malware Removal Tool

User Experience Join Our Forum to Discuss Magniber Ransomware.
Data Recovery Tool Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

.ndpyhss Ransomware – Distribution Methods

For the .ndpyhss files virus to be distributed and infect the maximum amount of victims out there, the crooks behind the virus may participate in massive spam campaigns, the purpose of which is to get victims to open a malicious e-mail attachment or click on a malicious web link. The idea behind those e-mails is that they often pretend to come from big and legitimate companies from the likes of:

  • DHL.
  • FedEx.
  • PayPal.
  • eBay.

The e-mails often contain convincing statements embedded within them such as to prompt victims to open e-mail attachments whose main idea is to cause the infection.

In addition to via e-mail, the Magniber ransomware virus may also spread by posing as a legitimate type of file that is upladoaded online while posing as a legitimate file. This basically means that the file may pretend to be:

  • Setup of a program.
  • Game patch or crack.
  • License activator.
  • Key generator.

.ndpyhss Ransomware — Targeted Vulnerabilities

The Magniber ransomware and its associated .ndpyhss virus strain have been found to use various exploits that target specific vulnerabilities. One of the distinct features of this particular threat is that during the 2017 attack campaigns the threat was using a mechanism called filtering gate nick named Magnigate which distributed Cerber ransomware. This particular threat allows the operators to defined specific values that are selected in the targets. This has allowed the criminals to carry out fine-tuned attacks that have plagued several countries in Asia. Their success has provoked other ransomware authors to selectively filter out the intended victims in a similar way.

The Magniber virus was delivered using two specific exploits targeting common vulnerabiliites:

  • CVE-2018-4878 — A use-after-free vulnerability was discovered in Adobe Flash Player before 28.0.0.161. This vulnerability occurs due to a dangling pointer in the Primetime SDK related to media player handling of listener objects. A successful attack can lead to arbitrary code execution.
  • CVE-2018-8174 — A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka “Windows VBScript Engine Remote Code Execution Vulnerability.” This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.

.ndpyhss Magniber Ransomware – Infection Activity

Once the .ndpyhss files variant of Magniber ransomware are dropped on the victims computers, the malware uses several modules which are dropped on the infected machine:

Main Infection Module – This module has a trojan-like capabilities which could turn the ransomware into spyware to steal and take control of computers.
Data Theft modules – they may be used to steal sensitive data, such as passwords, financial information or files.
Additional Malware dropper – this module may update the existing virus files or download another virus on the infected computer.

The malicious files are copied to a folder, which may also be changed after this happens. As soon as this is done, the malware’s files are changed into radnom names and may exist in te following Windows directories:

  • %Temp%
  • %AppData%
  • %Local%
  • %LocalLow%
  • %Roaming%

In addtion to this, the ransomware may also spawn processes as an administrator to perform various malicious activities such as information gathering activities that check if the virus is ran on a real system or a virtual drive and if that is the case, the malware may start to delete itself and will never run encryption. But if it’s running on an actual computer, it may start to drop it’s ransom note file, called README.txt, which contains instructions on how to pay a hefty ransom fee in order to restore the files that have been encrypted by this virus. The ransom note usually leads victims to the payment page of Magniber ransomware, which looks somewhat like the following:

In addition to instructions on how to pay the ransom, the virus may also provide the free decryption of 1 file to the victims, to prove that this blackmainling works.

.ndpyhss Files Virus – Encryption Process

For this variant to encrypt the files on the victims’ computers, it uses a pre-set list of file extensions which it targets for encryption. If those types of files are detected within the victim’s computer, the ransomware virus encrypts them:

→ docx xls xlsx ppt pptx pst ost msg em vsd vsdx csv rtf 123 wks wk1 pdf dwg
onetoc2 snt docb docm dot dotm dotx xlsm xlsb xlw xlt xlm xlc xltx xltm pptm
pot pps ppsm ppsx ppam potx potm edb hwp 602 sxi sti sldx sldm vdi vmx gpg
aes raw cgm nef psd ai svg djvu sh class jar java rb asp php jsp brd sch dch
dip vb vbs ps1 js asm pas cpp cs suo sln ldf mdf ibd myi myd frm odb dbf db
mdb accdb sq sqlitedb sqlite3 asc lay6 lay mm sxm otg odg uop std sxd otp
odp wb2 slk dif stc sxc ots ods 3dm max 3ds uot stw sxw ott odt pem p12 csr
crt key pfx der 1cd cd arw jpe eq adp odm dbc frx db2 dbs pds pdt dt cf cfu
mx epf kdbx erf vrp grs geo st pff mft efd rib ma lwo lws m3d mb obj x3d c4d
fbx dgn 4db 4d 4mp abs adn a3d aft ahd alf ask awdb azz bdb bib bnd bok btr
cdb ckp clkw cma crd dad daf db3 dbk dbt dbv dbx dcb dct dcx dd df1 dmo dnc
dp1 dqy dsk dsn dta dtsx dx eco ecx emd fcd fic fid fi fm5 fo fp3 fp4 fp5
fp7 fpt fzb fzv gdb gwi hdb his ib idc ihx itdb itw jtx kdb lgc maq mdn mdt
mrg mud mwb s3m ndf ns2 ns3 ns4 nsf nv2 nyf oce oqy ora orx owc owg oyx p96
p97 pan pdb pdm phm pnz pth pwa qpx qry qvd rctd rdb rpd rsd sbf sdb sdf spq
sqb stp str tcx tdt te tmd trm udb usr v12 vdb vpd wdb wmdb xdb xld xlgc zdb
zdc cdr cdr3 abw act aim ans apt ase aty awp awt aww bad bbs bdp bdr bean
bna boc btd cnm crw cyi dca dgs diz dne docz dsv dvi dx eio eit emlx epp err
etf etx euc faq fb2 fb fcf fdf fdr fds fdt fdx fdxt fes fft flr fodt gtp frt
fwdn fxc gdoc gio gpn gsd gthr gv hbk hht hs htc hz idx ii ipf jis joe jp1 jrtf
kes klg knt kon kwd lbt lis lit lnt lp2 lrc lst ltr ltx lue luf lwp lyt lyx man
map mbox me mel min mnt mwp nfo njx now nzb ocr odo of oft ort p7s pfs pjt prt
psw pu pvj pvm pwi pwr qd rad rft ris rng rpt rst rt rtd rtx run rzk rzn saf
sam scc scm sct scw sdm sdoc sdw sgm sig sla sls smf sms ssa sty sub sxg tab
tdf tex text thp tlb tm tmv tmx tpc tvj u3d u3i unx uof upd utf8 utxt vct vnt
vw wbk wcf wgz wn wp wp4 wp5 wp6 wp7 wpa wpd wp wps wpt wpw
wri wsc wsd wsh wtx
xd xlf xps xwp xy3 xyp xyw ybk ym zabw zw abm afx agif agp aic albm apd apm
apng aps apx art asw bay bm2 bmx brk brn brt bss bti c4 ca cals can cd5 cdc
cdg cimg cin cit colz cpc cpd cpg cps cpx cr2 ct dc2 dcr dds dgt dib djv dm3
dmi vue dpx wire drz dt2 dtw dv ecw eip exr fa fax fpos fpx g3 gcdp gfb gfie
ggr gih gim spr scad gpd gro grob hdp hdr hpi i3d icn icon icpr iiq info ipx
itc2 iwi j2c j2k jas jb2 jbig jbmp jbr jfif jia jng jp2 jpg2 jps jpx jtf jw
jxr kdc kdi kdk kic kpg lbm ljp mac mbm mef mnr mos mpf mpo mrxs my ncr nct
nlm nrw oc3 oc4 oc5 oci omf oplc af2 af3 asy cdmm cdmt cdmz cdt cmx cnv csy
cv5 cvg cvi cvs cvx cwt cxf dcs ded dhs dpp drw dxb dxf egc emf ep eps epsf
fh10 fh11 fh3 fh4 fh5 fh6 fh7 fh8 fif fig fmv ft10 ft11 ft7 ft8 ft9 ftn fxg
gem glox hpg hpg hp idea igt igx imd ink lmk mgcb mgmf mgmt mt9 mgmx mgtx
mmat mat ovp ovr pcs pfv plt vrm pobj psid rd scv sk1 sk2 ssk stn svf svgz
tlc tne ufr vbr vec vm vsdm vstm stm vstx wpg vsm xar ya orf ota oti ozb
ozj ozt pa pano pap pbm pc1 pc2 pc3 pcd pdd pe4 pef pfi pgf pgm pi1 pi2 pi3
pic pict pix pjpg pm pmg pni pnm pntg pop pp4 pp5 ppm prw psdx pse psp ptg
ptx pvr px pxr pz3 pza pzp pzs z3d qmg ras rcu rgb rgf ric riff rix rle rli
rpf rri rs rsb rsr rw2 rw s2mv sci sep sfc sfw skm sld sob spa spe sph spj
spp sr2 srw wallet jpeg jpg vmdk arc paq bz2 tbk bak tar tgz gz 7z rar zip
backup iso vcd bmp png gif tif tiff m4u m3u mid wma flv 3g2 mkv 3gp mp4 mov
avi asf mpeg vob mpg wmv fla swf wav mp3

But this variant of Magniber ransomware is also a clever one, which skips encrypting files In several important Windows folders in order to leave the infected machine intact and functional. The folders in it’s so-called “whitelist” appear like the following:

→ :\documents and settings\all users\
:\documents and settings\default user\
:\documents and settings\localservice\
:\documents and settings\networkservice\
\appdata\local\
\appdata\locallow\
\appdata\roaming\
\local settings\
\public\music\sample music\
\public\pictures\sample pictures\
\public\videos\sample videos\
\tor browser\
\$recycle.bin
\$windows.~bt
\$windows.~ws
\boot
\intel
\msocache
\perflogs
\program files (x86)
\program files
\programdata
\recovery
\recycled
\recycler
\system volume information
\windows.old
\windows10upgrade
\windows
\winnt

After the encryption process has completed, the Magniber ransomware virus assigns often a random file extension, one variant of which was detected by researcher Michael Gillespie to use the .ndpyhss file extension. The files appear like the following after they have been encrypted by Magniber Ransomware:

Remove Magiber Ransomware and Restore Encrypted Files

In order to remove this version of Magniber ransomware, we recommend that you follow the removal instructions underneath this article. They have been divided in manual and automatic removal methods. If manual removal is not something you feel certain in doing, reccomendations are to automatically remove this ransomware, with the aid of an advanced anti-malware software. It’s main purpose is to help you to automatically remove this threat by scanning for it and then deleting all of the associated objects as well as ensuring future protection in real-time as well.

If you want to restore files that have been encrypted by this ransomware infection, you can try using the newly released decryptor for Magniber ranosmware. In addition to this, if this decryptor does not work out for you, you can attempt using the alternative methods for file recovery in step “2. Restore files, encrypted by Magniber Ransomware”. They may not be 100% guarantee to be able to restore all of your encrypted files, but may help you recover some or more of them.

Avatar

Ventsislav Krastev

Ventsislav is a cybersecurity expert at SensorsTechForum since 2015. He has been researching, covering, helping victims with the latest malware infections plus testing and reviewing software and the newest tech developments. Having graduated Marketing as well, Ventsislav also has passion for learning new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management, Network Administration and Computer Administration of System Applications, he found his true calling within the cybersecrurity industry and is a strong believer in the education of every user towards online safety and security.

More Posts - Website

Follow Me:
Twitter


Attention! SensorsTechForum strongly recommends that all malware victims should look for assistance only by reputable sources. Many guides out there claim to offer free recovery and decryption for files encrypted by ransomware viruses. Be advised that some of them may only be after your money.

As a site that has been dedicated to providing free removal instructions for ransomware and malware since 2014, SensorsTechForum’s recommendation is to only pay attention to trustworthy sources.

How to recognize trustworthy sources:

  • Always check "About Us" web page.
  • Profile of the content creator.
  • Make sure that real people are behind the site and not fake names and profiles.
  • Verify Facebook, LinkedIn and Twitter personal profiles.


OFFER

REMOVE IT NOW (PC)
with Anti-Malware
We recommend you to download SpyHunter and run free scan to remove all virus files on your PC. This saves you hours of time and effort compared to doing the removal yourself.
SpyHunter 5 free remover allows you, subject to a 48-hour waiting period, one remediation and removal for results found. Read EULA and Privacy Policy


Windows Mac OS X

How to Remove Magniber Ransomware from Windows.


Step 1: Boot Your PC In Safe Mode to isolate and remove Magniber Ransomware

OFFER

Manual Removal Usually Takes Time and You Risk Damaging Your Files If Not Careful!
We Recommend To Scan Your PC with SpyHunter

Keep in mind, that SpyHunter’s scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware removal tool to remove the malware threats. Read our SpyHunter 5 review. Click on the corresponding links to check SpyHunter's EULA, Privacy Policy and Threat Assessment Criteria

1. Hold Windows key() + R


2. The "Run" Window will appear. In it, type "msconfig" and click OK.


3. Go to the "Boot" tab. There select "Safe Boot" and then click "Apply" and "OK".
Tip: Make sure to reverse those changes by unticking Safe Boot after that, because your system will always boot in Safe Boot from now on.


4. When prompted, click on "Restart" to go into Safe Mode.


5. You can recognise Safe Mode by the words written on the corners of your screen.


Step 2: Uninstall Magniber Ransomware and related software from Windows

Here is a method in few easy steps that should be able to uninstall most programs. No matter if you are using Windows 10, 8, 7, Vista or XP, those steps will get the job done. Dragging the program or its folder to the recycle bin can be a very bad decision. If you do that, bits and pieces of the program are left behind, and that can lead to unstable work of your PC, errors with the file type associations and other unpleasant activities. The proper way to get a program off your computer is to Uninstall it. To do that:


1. Hold the Windows Logo Button and "R" on your keyboard. A Pop-up window will appear.


2. In the field type in "appwiz.cpl" and press ENTER.


3. This will open a window with all the programs installed on the PC. Select the program that you want to remove, and press "Uninstall"
Follow the instructions above and you will successfully uninstall most programs.


Step 3: Clean any registries, created by Magniber Ransomware on your computer.

The usually targeted registries of Windows machines are the following:

  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce

You can access them by opening the Windows registry editor and deleting any values, created by Magniber Ransomware there. This can happen by following the steps underneath:

1. Open the Run Window again, type "regedit" and click OK.


2. When you open it, you can freely navigate to the Run and RunOnce keys, whose locations are shown above.


3. You can remove the value of the virus by right-clicking on it and removing it.
Tip: To find a virus-created value, you can right-click on it and click "Modify" to see which file it is set to run. If this is the virus file location, remove the value.

IMPORTANT!
Before starting "Step 4", please boot back into Normal mode, in case you are currently in Safe Mode.
This will enable you to install and use SpyHunter 5 successfully.

Step 4: Scan for Magniber Ransomware with SpyHunter Anti-Malware Tool

1. Click on the "Download" button to proceed to SpyHunter's download page.


It is recommended to run a scan before purchasing the full version of the software to make sure that the current version of the malware can be detected by SpyHunter. Click on the corresponding links to check SpyHunter's EULA, Privacy Policy and Threat Assessment Criteria.


2. After you have installed SpyHunter, wait for it to update automatically.

SpyHunter5-update-2018


3. After the update process has finished, click on the 'Malware/PC Scan' tab. A new window will appear. Click on 'Start Scan'.

SpyHunter5-Free-Scan-2018


4. After SpyHunter has finished scanning your PC for any files of the associated threat and found them, you can try to get them removed automatically and permanently by clicking on the 'Next' button.

SpyHunter-5-Free-Scan-Next-2018

If any threats have been removed, it is highly recommended to restart your PC.

Step 5 (Optional): Try to Restore Files Encrypted by Magniber Ransomware.

Ransomware infections and Magniber Ransomware aim to encrypt your files using an encryption algorithm which may be very difficult to decrypt. This is why we have suggested a data recovery method that may help you go around direct decryption and try to restore your files. Bear in mind that this method may not be 100% effective but may also help you a little or a lot in different situations.

1. Download the reccomended Data Recovery software by clicking on the link underneath:

Simply click on the link and on the website menus on top, choose Data Recovery - Data Recovery Wizard for Windows or Mac (depending on your OS), and then download and run the tool.


Windows Mac OS X

Get rid of Magniber Ransomware from Mac OS X.


Step 1: Uninstall Magniber Ransomware and remove related files and objects

OFFER
Manual Removal Usually Takes Time and You Risk Damaging Your Files If Not Careful!
We Recommend To Scan Your Mac with SpyHunter for Mac
Keep in mind, that SpyHunter for Mac needs to purchased to remove the malware threats. Click on the corresponding links to check SpyHunter’s EULA and Privacy Policy


1. Hit the ⇧+⌘+U keys to open Utilities. Another way is to click on “Go” and then click “Utilities”, like the image below shows:


2. Find Activity Monitor and double-click it:


3. In the Activity Monitor look for any suspicious processes, belonging or related to Magniber Ransomware:

Tip: To quit a process completely, choose the “Force Quit” option.


4. Click on the "Go" button again, but this time select Applications. Another way is with the ⇧+⌘+A buttons.


5. In the Applications menu, look for any suspicious app or an app with a name, similar or identical to Magniber Ransomware. If you find it, right-click on the app and select “Move to Trash”.


6: Select Accounts, after which click on the Login Items preference. Your Mac will then show you a list of items that start automatically when you log in. Look for any suspicious apps identical or similar to Magniber Ransomware. Check the app you want to stop from running automatically and then select on the Minus (“-“) icon to hide it.


7: Remove any left-over files that might be related to this threat manually by following the sub-steps below:

  • Go to Finder.
  • In the search bar type the name of the app that you want to remove.
  • Above the search bar change the two drop down menus to “System Files” and “Are Included” so that you can see all of the files associated with the application you want to remove. Bear in mind that some of the files may not be related to the app so be very careful which files you delete.
  • If all of the files are related, hold the ⌘+A buttons to select them and then drive them to “Trash”.

In case you cannot remove Magniber Ransomware via Step 1 above:

In case you cannot find the virus files and objects in your Applications or other places we have shown above, you can manually look for them in the Libraries of your Mac. But before doing this, please read the disclaimer below:

Disclaimer! If you are about to tamper with Library files on Mac, be sure to know the name of the virus file, because if you delete the wrong file, it may cause irreversible damage to your MacOS. Continue on your own responsibility!

1: Click on "Go" and Then "Go to Folder" as shown underneath:

2: Type in "/Library/LauchAgents/" and click Ok:

3: Delete all of the virus files that have similar or the same name as Magniber Ransomware. If you believe there is no such file, do not delete anything.

You can repeat the same procedure with the following other Library directories:

→ ~/Library/LaunchAgents
/Library/LaunchDaemons

Tip: ~ is there on purpose, because it leads to more LaunchAgents.


Click the button below below to download SpyHunter for Mac and scan for Magniber Ransomware:


Download

SpyHunter for Mac



Step 3 (Optional): Try to Restore Files Encrypted by Magniber Ransomware.

Ransomware infections and Magniber Ransomware aim to encrypt your files using an encryption algorithm which may be very difficult to decrypt. This is why we have suggested a data recovery method that may help you go around direct decryption and try to restore your files. Bear in mind that this method may not be 100% effective but may also help you a little or a lot in different situations.

1. Download the reccomended Data Recovery software by clicking on the link underneath:

Simply click on the link and on the website menus on top, choose Data Recovery - Data Recovery Wizard for Windows or Mac (depending on your OS), and then download and run the tool.


Magniber Ransomware FAQ

What is Magniber Ransomware ransomware and how does it work?

Magniber Ransomware is a ransomware infection - the malicious software that enters your computer silently and blocks either access to the computer itself or encrypt your files.

Many ransomware viruses use sophisticated encryption algorithm how to make your files inaccessible. The goal of ransomware infections is to demand that you pay a ransom payment to get access to your files back.

How does Magniber Ransomware ransomware infect my computer?

Via several ways.Magniber Ransomware Ransomware infects computers by being sent via phishing e-mails, containing virus attachment.

This attachment is usually masked as an important document, like an invoice, bank document or even a plane ticket and it looks very convincing to users.

After you download and execute this attachment, a drive-by download occurs and your computer is infected with the ransomware virus.

Another way, you may become a victim of Magniber Ransomware is if you download a fake installer, crack or patch from a low reputation website or if you click on a virus link. Many users report getting a ransomware infection by downloading torrents.

How to open .Magniber Ransomware files?

You can't. At this point the .Magniber Ransomware files are encrypted. You can only open them once they are decrypted.

Decryptor did not decrypt my data. What now?

Do not panic and backup the files. If a decryptor did not decrypt your .Magniber Ransomware files successfully, then do not despair, because this virus is still new.

One way to restore files, encrypted by Magniber Ransomware ransomware is to use a decryptor for it. But since it's a new virus, advised that the decryption keys for it may not be out yet and available to the public. We will update this article and keep you posted as soon as this decryptor is released.

How Do I restore ".Magniber Ransomware" files (Other Methods)?

Yes, sometimes files can be restored. We have suggested several file recovery methods that could work if you want to restore .Magniber Ransomware files.

These methods are in no way 100% guarantee that you will be able to get your files back. But if you have a backup, your chances of success are much greater.

How do I get rid of Magniber Ransomware ransomware virus?

The safest way and the most efficient one for the removal of this ransomware infection is the use a professional anti malware software. It will scan for and locate Magniber Ransomware ransomware and then remove it without causing any additional harm to your important .Magniber Ransomware files.

Also, keep in mind that viruses like Magniber Ransomware ransomware also install Trojans and keyloggers that can steal your passwords and accounts. Scanning your computer with an anti-malware software will make sure that all of these virus components are removed and your computer is protected in the future.

What to Do If nothing works?

There is still a lot you can do. If none of the above methods seem to work for you, then try these methods:

  • Try to find a safe computer from where you can can login on your own line accounts like One Drive, iDrive, Google Drive and so on.
  • Try to contact your friends, relatives and other people so that they can check if they have some of your important photos or documents just in case you sent them.
  • Also, check if some of the files that were encrypted it can be re-downloaded from the web.
  • Another clever way to get back some of your files is to find another old computer, a flash drive or even a CD or a DVD where you may have saved your older documents. You might be surprised what will turn up.
  • You can also go to your email account to check if you can send any attachments to other people. Usually what is sent the email is saved on your account and you can re-download it. But most importantly, make sure that this is done from a safe computer and make sure to remove the virus first.

More tips you can find on our forums, where you can also asks any questions about your ransomware problem.

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Stay tuned
Subscribe for our newsletter regarding the latest cybersecurity and tech-related news.