#ransomware

[ follow ]
#data-breach
fromdatabreaches.net
1 week ago
Information security

Ransomware attack compromised 377,000 people's Social Security and driver's license numbers from Texas gas station and convenience store chain

fromdatabreaches.net
1 week ago
Information security

Ransomware attack compromised 377,000 people's Social Security and driver's license numbers from Texas gas station and convenience store chain

fromThe Hacker News
1 day ago

Reynolds Ransomware Embeds BYOVD Driver to Disable EDR Security Tools

Cybersecurity researchers have disclosed details of an emergent ransomware family dubbed Reynolds that comes embedded with a built-in bring your own vulnerable driver (BYOVD) component for defense evasion purposes within the ransomware payload itself. BYOVD refers to an adversarial technique that abuses legitimate but flawed driver software to escalate privileges and disable Endpoint Detection and Response (EDR) solutions so that malicious activities go unnoticed. The strategy has been adopted by many ransomware groups over the years.
Information security
fromThe Hacker News
1 day ago

From Ransomware to Residency: Inside the Rise of the Digital Parasite

To be clear, ransomware isn't going anywhere, and adversaries continue to innovate. But the data shows a clear strategic pivot away from loud, destructive attacks toward techniques designed to evade detection, persist inside environments, and quietly exploit identity and trusted infrastructure. Rather than breaking in and burning systems down, today's attackers increasingly behave like Digital Parasites. They live inside the host, feed on credentials and services, and remain undetected for as long as possible.
Information security
fromZDNET
1 day ago

This new 'sleeperware' doesn't set off alarms or crash your system - it sneaks in and waits

In its annual Red Report, a body of research that analyzes real-world attacker techniques using large-scale attack simulation data, Picus Labs warns cybersecurity professionals that threat actors are rapidly shifting away from ransomware encryption to parasitic "sleeperware" extortion as their means to loot organizations for millions of dollars per attack. Released today and now in its sixth year, the 278-page Red Report gets its name from Picus-organized cybersecurity exercises that take the perspective of the attacker's team, otherwise known as the "red team."
Information security
#smartermail
fromThe Hacker News
1 day ago
Information security

Warlock Ransomware Breaches SmarterTools Through Unpatched SmarterMail Server

An unpatched SmarterMail VM allowed the Warlock ransomware group to breach SmarterTools, affecting internal servers and some hosted SmarterTrack customers.
fromSecurityWeek
2 days ago
Information security

SmarterTools Hit by Ransomware via Vulnerability in Its Own Product

SmarterTools was breached via an unpatched SmarterMail VM, enabling the Warlock ransomware group to laterally compromise Windows servers and some customer systems.
Information security
fromSecuritymagazine
1 day ago

Understanding Breaches Before and After They Happen: What Every Organization Should Know

Most security breaches result from neglected fundamentals—human error, unpatched systems, weak authentication, and poor network segmentation—rather than advanced, novel exploits.
Information security
fromSecurityWeek
2 days ago

Ransomware Groups May Pivot Back to Encryption as Data Theft Tactics Falter

Ransomware groups find pure data exfiltration less profitable; attackers are shifting back to encryption to regain leverage as victim payment rates fall.
#cisa
Higher education
fromTechCrunch
6 days ago

One of Europe's largest universities knocked offline for days after cyberattack | TechCrunch

La Sapienza University’s computer systems have been offline for three days after an apparent ransomware attack affecting emails and workstations; recovery is underway from backups.
Information security
fromTechCrunch
6 days ago

Data breach at govtech giant Conduent balloons, affecting millions more Americans | TechCrunch

A January 2025 ransomware attack on Conduent may have exposed personal data of potentially tens of millions of US residents across multiple states.
Information security
fromTechzine Global
6 days ago

Western Europe is a hotbed for cybercriminals' servers

Cybercriminals abuse ISPsystem's VMmanager and 'bulletproof' European hosting to run ransomware on recurring Windows hostnames and evade abuse complaints.
Information security
fromTheregister
1 week ago

Nitrogen can't unlock its own ransomware after coding error

Nitrogen's VMware ESXi ransomware corrupts the public key via a stack overlap, making decryption impossible even if victims pay.
Information security
fromComputerWeekly.com
1 week ago

Ransomware gangs focus on winning hearts and minds | Computer Weekly

Ransomware gangs are professionalizing, scaling affiliate models, recruiting insiders and cyber professionals, and offering larger commissions and better OpSec to enable more successful attacks.
Information security
fromSecurityWeek
1 week ago

Over 1,400 MongoDB Databases Ransacked by Threat Actor

1,416 of 3,100 internet-exposed MongoDB databases were compromised and replaced with ransom notes demanding about $500 in Bitcoin per incident.
Information security
fromTechCrunch
1 week ago

Fintech firm Marquis blames hack at firewall provider SonicWall for its data breach | TechCrunch

Marquis attributes an August 2025 ransomware attack to credential exposure from its firewall provider SonicWall's cloud backup breach and plans to seek compensation.
#healthcare-data-breach
#ramp
Information security
fromArs Technica
1 week ago

Site catering to online criminals has been seized by the FBI

The FBI seized RAMP, a major Russian-language ransomware marketplace with over 14,000 vetted users, disrupting a significant cybercrime forum and its operations.
Information security
fromDataBreaches.Net
2 weeks ago

France's Waltio faces ransom threat from notorious hacker collective - DataBreaches.Net

Waltio faces a ShinyHunters ransom threat claiming nearly 50,000 users' data and threatening to leak 2024 tax reports, while core systems remain secure.
Canada news
fromwww.cbc.ca
2 weeks ago

More criminals are using AI for ransomware attacks, cybersecurity centre warns | CBC News

Ransomware attacks in Canada are increasing and evolving rapidly, with criminals using AI to identify vulnerabilities, create malware, and automate extortion.
fromComputerWeekly.com
2 weeks ago

Broken decryptor leaves Sicarii ransomware victims adrift | Computer Weekly

A coding error, possibly introduced thanks to over-reliance on artificial intelligence (AI) vibe coding tools, has rendered an emergent strain of ransomware an acutely dangerous threat, according to researchers at Halcyon's Ransomware Research Center (RRC). The Sicarii ransomware-as-a-service (RaaS) operation emerged from the cyber criminal underground in December 2025, when it started advertising for affiliates on the dark web.
Information security
Information security
fromThe Hacker News
2 weeks ago

Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware

Multi-stage phishing campaign targets Russian users, using social-engineered documents, cloud-hosted loaders, Defender-disable tricks, and deployments of Amnesia RAT and ransomware.
Information security
fromSecurityWeek
2 weeks ago

Nike Probing Potential Security Incident as Hackers Threaten to Leak Data

Nike is investigating a potential cybersecurity incident after WorldLeaks listed Nike as a victim and threatened to publish alleged stolen data unless paid.
Information security
fromChannelPro
3 weeks ago

Ransomware is on the rise. Again

Ransomware is resurging with smarter, AI-augmented attacks that leverage phishing, credential theft, and identity/access exploitation, pressuring defenders and creating MSP opportunities.
fromDataBreaches.Net
3 weeks ago

2025: Double the breaches, but less patient data compromised - DataBreaches.Net

In 2025, the frequency of healthcare data breaches more than doubled. However, the number of patient records exposed has significantly decreased, indicating a shift in the data breach landscape, according to a new report from Fortified Health Security.
Healthcare
Information security
fromTechzine Global
3 weeks ago

New Windows backdoor emerges in ransomware attack

PDFSider is a stealthy Windows backdoor deployed via social engineering and DLL side-loading to provide persistent, encrypted access and data exfiltration over DNS.
#cybercrime
fromFortune
1 month ago
Information security

Feds are hunting teenage hacking groups like 'Scattered Spider' who have targeted $1 trillion worth of the Fortune 500 since 2022 | Fortune

fromFortune
1 month ago
Information security

Feds are hunting teenage hacking groups like 'Scattered Spider' who have targeted $1 trillion worth of the Fortune 500 since 2022 | Fortune

#black-basta
fromDataBreaches.Net
3 weeks ago

HHS OCR comments on its 2026 priorities - DataBreaches.Net

OCR continues to execute its enforcement mission under its statutory and regulatory authorities regarding civil rights, exercise of conscience, and health information privacy and security, and breach notification. OCR continues to investigate complaints filed, to conduct compliance reviews, and to review breaches of unsecured protected health information. OCR will be responsive to the HIPAA trends and compliance issues within OCR's jurisdiction that are affecting the public and the regulated industry.
Privacy professionals
Information security
fromTheregister
4 weeks ago

DeadLock ransomware uses smart contracts to evade defenders

DeadLock ransomware uses Polygon smart contracts and decentralized messaging wrappers to rotate proxy URLs and evade detection while relying on encryption-only extortion.
Public health
fromDataBreaches.Net
4 weeks ago

University of Hawaii Cancer Center: Hackers Stole Research Files, Encrypted Data - DataBreaches.Net

Ransomware attackers stole data from University of Hawaii Cancer Center studies from the 1990s, and the center paid a ransom for a decryptor key.
fromComputerWeekly.com
4 weeks ago

Business leaders see AI risks and fraud outpacing ransomware, says WEF | Computer Weekly

Midway through a decade that is coming to be defined by the runaway acceleration of technological change, the threat of ransomware attacks seems to be dropping down the agenda in boardrooms around the world, with C-suite executives more concerned about growing risks arising from artificial intelligence (AI) vulnerabilities, cyber-enabled fraud and phishing attacks, disruption to supply chains, and exploitation of software vulnerabilities.
Information security
Information security
fromDataBreaches.Net
4 weeks ago

CrazyHunter ransomware escalates with advanced intrusion tactics, six Taiwan healthcare victims confirmed - DataBreaches.Net

CrazyHunter ransomware, a Go-based Prince fork, has rapidly evolved with advanced intrusion and evasion capabilities, targeting Taiwanese healthcare providers and leaking stolen data.
France news
fromDataBreaches.Net
1 month ago

Basketball player arrested for alleged ransomware ties freed in Russia-France prisoner swap - DataBreaches.Net

Daniil Kasatkin, a Russian basketball player accused of negotiating for a ransomware gang, was freed in a prisoner exchange between Russia and France.
World news
fromTheregister
1 month ago

France swaps alleged ransomware crook for conflict researche

France exchanged an alleged US-wanted ransomware suspect for pardoned French researcher Laurent Vinatier, who was released from a Russian prison.
Information security
fromThe Hacker News
1 month ago

Cybersecurity Predictions 2026: The Hype We Can Ignore (And the Risks We Can't)

Organizations must prioritize evidence-based cybersecurity predictions focusing on targeted ransomware, internal AI-related risks, and skepticism about AI-orchestrated attacks.
fromTheregister
1 month ago

Ransomware attacks kept climbing in 2025

Trackers keeping an eye on ransomware leak sites logged more than 8,000 claimed victims worldwide in 2025, a rise of more than 50 percent compared to 2023. The counts come from outfits watching dark web shaming pages such as Ransomware.live and RansomLook.io, so they only include cases where crooks decided to post receipts. Plenty of victims, Emsisoft says, will have paid up, recovered, or kept quiet without ever appearing on a leak site.
Information security
#healthcare
#cybersecurity
fromNature
2 months ago
Information security

Cyberattacks' harm to universities is growing - and so are their effects on research

fromNature
2 months ago
Information security

Cyberattacks' harm to universities is growing - and so are their effects on research

#lockbit
Information security
fromComputerworld
1 month ago

US cybersecurity experts plead guilty to attacking US companies with ransomware

Two cybersecurity professionals pleaded guilty to conspiring to use BlackCat ransomware to extort multiple U.S. victims and will be sentenced March 12, 2026.
#alphv-blackcat
fromDataBreaches.Net
1 month ago
US news

Two Cybersecurity Professionals Plead Guilty to Targeting Multiple U.S. Victims Using ALPHV BlackCat Ransomware - DataBreaches.Net

fromDataBreaches.Net
1 month ago
US news

Two Cybersecurity Professionals Plead Guilty to Targeting Multiple U.S. Victims Using ALPHV BlackCat Ransomware - DataBreaches.Net

Information security
fromTechzine Global
1 month ago

Security experts themselves carried out ransomware attacks

Two U.S. cybersecurity employees pleaded guilty to using BlackCat/ALPHV ransomware to extort victims, launder proceeds, and face up to 20 years in prison.
Information security
fromSocial Media Explorer
1 month ago

Is Your Bank Prepared for the Next Big Cybersecurity Threat? - Social Media Explorer

Preparedness through managed IT services and proactive security is essential for banks to counter evolving cyber threats like ransomware and spear-phishing.
Information security
fromThe Verge
1 month ago

Two cybersecurity employees plead guilty to carrying out ransomware attacks

Two former cybersecurity employees pleaded guilty to using ALPHV/BlackCat ransomware to extort $1.2 million and target multiple U.S. companies in 2023.
Information security
fromAxios
1 month ago

Why hackers love the holidays

Attackers exploit reduced holiday security staffing to carry out phishing, ransomware, and data theft, so organizations must harden defenses before holidays.
World news
fromThe Hacker News
1 month ago

INTERPOL Arrests 574 in Africa; Ukrainian Ransomware Affiliate Pleads Guilty

Operation Sentinel recovered $3 million, arrested 574 suspects across 19 African countries, removed over 6,000 malicious links, and decrypted six ransomware variants.
Miscellaneous
fromTheregister
1 month ago

1,000 systems pwned in Romanian Waters ransomware attack

A ransomware attack encrypted files on about 1,000 systems across Romania's water management administration, affecting multiple servers while hydrotechnical operations continue locally.
#cyberattack
fromIT Pro
2 months ago
Information security

Impact of Asahi cyber attack laid bare as company confirms 1.5 million customers exposed

fromIT Pro
2 months ago
Information security

Impact of Asahi cyber attack laid bare as company confirms 1.5 million customers exposed

fromTheregister
1 month ago

FBI dismantles alleged $70M crypto laundering operation

US feds have dismantled a crypto laundering service that they say helped cybercrooks wash tens of millions of dollars in dirty digital cash, seizing its servers and unsealing charges against an alleged Russian operator. The FBI, working with cops in Europe and a grab bag of state and federal agencies, announced this week that it has taken down the infrastructure behind E-Note, an unlicensed virtual currency exchange accused of acting as a financial rinse cycle for ransomware crews, account takeover gangs, and other online criminals.
US news
Information security
fromTheregister
1 month ago

React2Shell: Microsoft counts hundreds of hacked machines

Attackers exploited React2Shell (CVE-2025-55182) to compromise several hundred servers, execute arbitrary code, deploy malware, and in some cases deliver ransomware.
Information security
fromComputerWeekly.com
1 month ago

ClickFix attacks that bypass cyber controls on the rise | Computer Weekly

ClickFix attacks surged in 2025, tricking users into running commands that bypass conventional defenses and enable RATs, credential theft, and ransomware.
fromZDNET
1 month ago

Still running Windows 10? Here's why that's a bad idea

Hundreds of millions of computers worldwide are still running Windows 10, months after the one-time king of PC operating systems officially passed its end-of-support deadline. If you're responsible for one of those machines and you aren't ready to upgrade to Windows 11, you can sign up today for an Extended Security Updates (ESU) subscription -- consumers can get those updates free through October 2026, as I explain here: How to get free Windows 10 security patches on your PC - from now to October 2026.
Information security
Information security
fromAbove the Law
2 months ago

Incident Response Has Become A Law Firm Survival Skill - Above the Law

Law firms face targeted cyberattacks; preparedness and practiced incident response, clear leadership, and fast decisions prevent compounded damage and regulatory, ethical, and malpractice risks.
#hypervisor-security
fromTechzine Global
2 months ago
Information security

Ransomware increasingly targeting hypervisors

Attackers increasingly target hypervisors (VMware ESXi, Microsoft Hyper-V) to compromise entire virtual environments, enabling large-scale ransomware impact by controlling the virtualization layer.
fromTheregister
2 months ago
DevOps

Researchers spot 700 percent increase in hypervisor attacks

Ransomware attacks on hypervisors surged, with Akira driving a rise from 3% to 25%, exploiting weak defenses to encrypt virtual machines.
Information security
fromThe Hacker News
2 months ago

STAC6565 Targets Canada in 80% of Attacks as Gold Blade Deploys QWCrypt Ransomware

STAC6565 (Gold Blade/RedCurl) targeted Canadian organizations, combining data theft and selective ransomware operations using custom tools such as QWCrypt and RedLoader.
fromTheregister
2 months ago

Asus supplier hacked by Everest gang, loses 1 TB of data

In a post on its dark web leak site, seen by The Register, Everest said: "Files contain this information and much more: Binary segmentation modules, Source code & patches, RAM dumps & memory logs, AI models & weights, OEM internal tools & firmware, Test videos, Calibration & dual-camera data, Image datasets, Crash logs & debug reports, Evaluation & performance reports, HDR, fusion, post processing data, Test APKs, experimental apps, Scripts & automation, Small config binary calibration files."
Information security
Information security
fromIT Pro
2 months ago

The most prominent infostealers and how businesses can protect against them

Infostealers increasingly harvest credentials that enable major breaches and ransomware, with strains like Stealerium and Lumma driving widespread, adaptable, multi-vector attacks.
fromTechzine Global
2 months ago

Manufacturing sees less data encryption in cyberattacks, but still pays

Encryption rates in ransomware attacks on manufacturing companies have fallen sharply. Only 40 percent of attacks resulted in actual encryption, the lowest level in five years and a significant drop from 74 percent last year. However, attackers are compensating for this with a different tactic: extortion without encryption rose from 3 percent in 2024 to 10 percent in 2025. They are increasingly relying on stolen data as a means of pressure.
Information security
Miscellaneous
fromBitcoin Magazine
2 months ago

Europol, Swiss Police Shatter $1.5B Bitcoin 'Cryptomixer'

Swiss and German law enforcement shut down Cryptomixer.io, seizing servers, the domain, over EUR 25 million in bitcoin and more than 12 terabytes of data.
Information security
fromComputerworld
2 months ago

Why security needs a step change to thwart cyber attacks amid surging innovation

Enterprises must implement comprehensive vulnerability management—including automated scanning, prompt patching, and scalable penetration testing—to prevent preventable breaches and reduce attack surfaces from AI adoption.
London
fromwww.theguardian.com
2 months ago

Londoners told to be vigilant with messages after cyber-attack on council

RBKC confirmed data were copied in a cyber-attack and urged residents to be extra vigilant for suspicious calls, emails or texts while investigations continue.
Information security
fromTheregister
2 months ago

Get ready for 2026, the year of AI-aided ransomware

Cybercriminals will increasingly adopt agentic AI to automate attacks, following state-sponsored pioneers, enabling more autonomous, scalable, low-effort cyber operations.
Information security
fromTelecompetitor
2 months ago

Ransomware Spikes During Holidays and Weekends: Report

Ransomware attacks most often occur on weekends and holidays and increase after mergers and acquisitions due to reduced staffing and weakened governance.
fromIT Pro
2 months ago

Simulating attacks: how to use tabletop exercises in incident response

Among the benefits, tabletop exercises simulate a real-life attack so firms can put incident response plans to the test, including decision-making processes, communications and technical measures. When done well, tabletop exercises can expose blind spots and help response teams "build the muscle memory needed to act fast when the real thing hits", says Adam Harrison, managing director in the cyber security practice at FTI Consulting. So what types of tabletop exercises are available and how can you use them in your business?
Information security
World news
fromComputerWeekly.com
2 months ago

Russian money launderers bought a bank to disguise ransomware profit | Computer Weekly

A UK-linked billion-dollar money-laundering network bought a Kyrgyz bank to convert criminal proceeds into cryptocurrency and evade sanctions supporting Russia's war in Ukraine.
[ Load more ]