#ransomware

[ follow ]
Information security
fromThe Hacker News
1 day ago

Ransomware's Fragmentation Reaches a Breaking Point While LockBit Returns

Ransomware fragmented in Q3 2025 with 85 active groups, 1,592 victims, 14 new brands, and LockBit’s return suggesting possible re-centralization.
#data-breach
fromDataBreaches.Net
3 weeks ago
Law

Bombay High Court Orders Department of Telecommunications to Block Medusa Accounts After Generali Insurance Data Breach - DataBreaches.Net

fromIT Pro
3 weeks ago
Information security

Volkswagen confirms security 'incident' amid ransomware breach claims

fromThe Walrus
1 month ago
Information security

The Cyberattack That Stole 280,000 Identities-and Showed How Easily We Can Be Duped | The Walrus

fromDataBreaches.Net
3 weeks ago
Law

Bombay High Court Orders Department of Telecommunications to Block Medusa Accounts After Generali Insurance Data Breach - DataBreaches.Net

fromIT Pro
3 weeks ago
Information security

Volkswagen confirms security 'incident' amid ransomware breach claims

fromThe Walrus
1 month ago
Information security

The Cyberattack That Stole 280,000 Identities-and Showed How Easily We Can Be Duped | The Walrus

fromTheregister
2 days ago

NHS supplier ends 18-month probe into cyberattack

In a statement published this week, Synnovis said the investigation "took more than a year to complete because the compromised data was unstructured, incomplete and fragmented, and often very difficult to understand." It added that specialist incident response teams had to use "highly specialized platforms and bespoke processes" to work through terabytes of jumbled information and identify which healthcare providers' patients were affected.
Healthcare
#cyber-insurance
fromDataBreaches.Net
3 weeks ago
Information security

A business's cyber insurance policy included ransom coverage, but when they needed it, the insurer refused to pay. Why? - DataBreaches.Net

fromDataBreaches.Net
3 weeks ago
Information security

A business's cyber insurance policy included ransom coverage, but when they needed it, the insurer refused to pay. Why? - DataBreaches.Net

Information security
fromThe Hacker News
4 days ago

GootLoader Is Back, Using a New Font Trick to Hide Malware on WordPress Sites

GootLoader has resurfaced, using custom WOFF2 glyph substitution and WordPress comment endpoints to deliver XOR-encrypted ZIP payloads, enabling rapid domain controller compromise and ransomware hand-offs.
Information security
fromTheregister
5 days ago

Russian broker pleads guilty to assisting US cyberattacks

Aleksei Volkov, a 25-year-old Russian initial access broker tied to Yanluowang, pleaded guilty and faces years in US prison for facilitating multiple ransomware attacks.
#vulnerabilities
fromIT Pro
3 weeks ago
Information security

Threat actors are exploiting flaws more quickly - here's what business leaders should do

fromIT Pro
3 weeks ago
Information security

Threat actors are exploiting flaws more quickly - here's what business leaders should do

Tech industry
fromABC7 Los Angeles
1 week ago

DriveSavers is rescuing lost data while restoring peace of mind

DriveSavers recovers inaccessible data from damaged or failed storage devices, restoring photos, videos, documents, phones, servers, and ransomware-affected systems.
#oracle-e-business-suite
fromIT Pro
1 month ago
Information security

Google warns executives are being targeted for extortion with leaked Oracle data

fromIT Pro
1 month ago
Information security

Google warns executives are being targeted for extortion with leaked Oracle data

fromArs Technica
1 week ago

How to trade your $214,000 cybersecurity job for a jail cell

Martin had apparently seen how this system worked in practice through his job, and he approached a pair of other people to help him make some easy cash. One of these people was allegedly Ryan Goldberg of Watkinsville, Georgia, who worked as an incident manager at the cybersecurity firm Sygnia. Goldberg told the FBI that Martin had recruited him to "try and ransom some companies."
Information security
fromThe Hacker News
1 week ago

Enterprise Credentials at Risk - Same Old, Same Old?

Imagine this: Sarah from accounting gets what looks like a routine password reset email from your organization's cloud provider. She clicks the link, types in her credentials, and goes back to her spreadsheet. But unknown to her, she's just made a big mistake. Sarah just accidentally handed over her login details to cybercriminals who are laughing all the way to their dark web marketplace, where they'll sell her credentials for about $15. Not much as a one-off, but a serious money-making operation when scaled up.
Information security
Information security
fromThe Hacker News
1 week ago

Vibe-Coded Malicious VS Code Extension Found with Built-In Ransomware Capabilities

A malicious VS Code extension named susvsex uses AI-assisted code to zip, exfiltrate, and encrypt files and leverages GitHub as a command-and-control channel.
Information security
fromChannelPro
1 week ago

How the channel weakened ransomware's grip

Businesses increasingly choose recovery from backups over paying ransomware, enabled by MSP-supported air-gapped, immutable backups, regular testing, and multi-vendor resilience strategies.
#alphvblackcat
fromTechCrunch
1 week ago
US news

DOJ accuses US ransomware negotiators of launching their own ransomware attacks | TechCrunch

fromTechCrunch
1 week ago
US news

DOJ accuses US ransomware negotiators of launching their own ransomware attacks | TechCrunch

#insider-threat
fromIT Pro
1 week ago
Information security

When cyber professionals go rogue: A former 'ransomware negotiator' has been charged amid claims they attacked and extorted businesses

Two former cybersecurity employees were indicted for using ALPHV/BlackCat ransomware to hack multiple companies and extort payments, receiving about $1.27 million.
fromwww.mercurynews.com
1 week ago
Information security

Ex-cybersecurity staffers charged with moonlighting as hackers

Three cybersecurity employees allegedly conducted ransomware attacks while working in incident response and negotiation roles, extorting victims and sharing illicit proceeds with ransomware developers.
fromIT Pro
1 week ago
Information security

When cyber professionals go rogue: A former 'ransomware negotiator' has been charged amid claims they attacked and extorted businesses

Information security
fromThe Hacker News
1 week ago

Ransomware Defense Using the Wazuh Open Source Platform

Ransomware encrypts or locks systems and increasingly exfiltrates data for double extortion, spreading via phishing, exploits, RaaS, and sophisticated development and propagation techniques.
#artificial-intelligence
Information security
fromThe Hacker News
1 week ago

U.S. Prosecutors Indict Cybersecurity Insiders Accused of BlackCat Ransomware Attacks

Three U.S. nationals allegedly used BlackCat ransomware to hack five U.S. companies between May and November 2023 and extorted cryptocurrency payments.
Information security
fromThe Hacker News
1 week ago

Weekly Recap: Lazarus Hits Web3, Intel/AMD TEEs Cracked, Dark Web Leak Tool & More

Cyberattacks are increasingly sophisticated, exploiting new vulnerabilities, trusted systems, and encrypted backups to conduct espionage, ransomware, and phishing across diverse targets.
Information security
fromIT Pro
1 week ago

Ransomware attacks are hitting European enterprises at record pace

Europe faces record ransomware and state-sponsored cyberattacks, with faster deployments and broad targeting across industries including healthcare, defense, and critical infrastructure.
Information security
fromComputerWeekly.com
2 weeks ago

LockBit 5.0 expands targeting amid ransomware escalation | Computer Weekly

Ransomware attacks rose 28% in September to 421 incidents, with LockBit variants and multiple RaaS groups expanding targeting across the Americas, Asia, and Europe.
#cybersecurity
fromComputerWeekly.com
2 weeks ago

Effective cyber sanctions require a joined-up approach, says Rusi | Computer Weekly

"Sanctions will not deter all malicious cyber activity," he said. "What they can do is complicate operations, raise costs, disrupt enabling infrastructure and signal collective resolve." Saiz explained that sanctions can deter adversaries by imposing friction, restricting access to various resources - both financial and technical - and making threat actor networks publicly toxic, such as the UK's National Crime Agency (NCA) did to LockBit with some success. However, he warned, cyber sanctions do not deter every threat actor and their practical impact varies wildly.
World news
#data-exfiltration
fromZDNET
2 weeks ago
Information security

No one pays ransomware demands anymore - so attackers have a new goal

fromZDNET
2 weeks ago
Information security

No one pays ransomware demands anymore - so attackers have a new goal

#vpn-security
Information security
fromThe Hacker News
2 weeks ago

Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks

AdaptixC2 is an open-source, extensible post-exploitation C2 framework with advanced features that is increasingly adopted by threat actors, including groups linked to ransomware.
Information security
fromComputerWeekly.com
2 weeks ago

Ransomware resilience: It's time to be 'more Bruce Lee' | Computer Weekly

Applying Jeet Kune Do principles—absorb what works, discard what doesn't, use direct, simple, intercepting defensive-offensive measures—strengthens defenses against evolving, collaborative ransomware threats.
#supply-chain-disruption
#supply-chain-security
fromTechzine Global
1 month ago
Information security

Minimizing liability is not the same as security: Lessons learned from Collin's Aerospace cyberattack

fromTechzine Global
1 month ago
Information security

Minimizing liability is not the same as security: Lessons learned from Collin's Aerospace cyberattack

#clickfix
fromZDNET
3 weeks ago
Information security

Your phishing detection skills are no match for 2025's biggest security threats

fromZDNET
3 weeks ago
Information security

Your phishing detection skills are no match for 2025's biggest security threats

fromSecuritymagazine
3 weeks ago

A Real-Life Horror Story: When AI Ghouls Move Faster Than Defenses Can React

In the past year, the rapid democratization of AI has opened the door for a new class of haunting threats. Malware creation, once a domain requiring deep expertise and significant time, can now be automated in mere seconds. It's no longer about who has the most sophisticated tools, but who can leverage AI the fastest - and the current advantage favors the bad actors. It's like a haunted house gone wrong, and the monsters are in control.
Information security
Information security
fromTheregister
3 weeks ago

Muji's minimalist vibe wrecked amid supply chain attack

Muji suspended online orders because its logistics partner Askul was knocked offline by a ransomware attack, halting fulfillment and related services.
fromTheregister
3 weeks ago

Can malware vaccines stop ransomware's rampage?

Typically, when ransomware gets into a Windows machine, it first scans the cached memory, registry keys, file paths, and running processes to see whether the system is already infected, running on a malware analyst's computer, or trying to run in the sandboxed environment of a virtualized machine. If it sees any of these signs, it gives up, but if not, the ransomware sends a message back to the cybercriminals' servers
Information security
Information security
fromIT Pro
3 weeks ago

Microsoft issues warning over "opportunistic" cyber criminals targeting big business

Extortion and ransomware now motivate over half of cyberattacks, with financially driven incidents comprising at least 52%, far exceeding espionage.
Information security
fromTechRepublic
1 month ago

'A Call to Arms' as UK Faces 50% Surge in Major Cyberattacks

Highly significant cyberattacks in the UK rose 50%, driven by greater digital dependence, surging ransomware, and increased state-sponsored and hacktivist activity.
Information security
fromDataBreaches.Net
1 month ago

The Alliance That Wasn't: A Critical Analysis of ReliaQuest's Q3 2025 Ransomware Report - DataBreaches.Net

No verifiable evidence exists that LockBit, DragonForce, and Qilin formed an alliance; claims are speculative and unsubstantiated.
fromwww.theguardian.com
1 month ago

Cyber-attacks rise by 50% in past year, UK security agency says

In what officials described as a call to arms, national security officials and ministers are urging all organisations, from the smallest businesses to the largest employers, to draw up contingency plans for the eventuality that your IT infrastructure [is] crippled tomorrow and all your screens [go] blank. The NCSC, which is part of GCHQ, said highly sophisticated China, capable and irresponsible Russia, Iran and North Korea were the main state threats, in its annual review published on Tuesday.
Information security
fromThe Hacker News
1 month ago

Weekly Recap: WhatsApp Worm, Critical CVEs, Oracle 0-Day, Ransomware Cartel & More

Dozens of Orgs Impacted by Exploitation of Oracle EBS Flaw - Dozens of organizations may have been impacted following the zero-day exploitation of a security flaw in Oracle's E-Business Suite (EBS) software since August 9, 2025, according to Google Threat Intelligence Group (GTIG) and Mandiant. The activity, which bears some hallmarks associated with the Cl0p ransomware crew, is assessed to have fashioned together multiple distinct vulnerabilities, including a zero-day flaw tracked as CVE-2025-61882 (CVSS score: 9.8), to breach target networks and exfiltrate sensitive data.
Information security
Information security
fromDataBreaches.Net
1 month ago

From sizzle to drizzle to fizzle: The massive data leak that wasn't - DataBreaches.Net

A ransomware group leaked data from six of 39 targeted companies, published downloads across onion and clear-net sites, then halted further leaks despite followers' expectations.
#velociraptor
#healthcare-breach
fromDataBreaches.Net
1 month ago
Information security

Watsonville Community Hospital had a data breach - or two. It would be helpful to know which. - DataBreaches.Net

fromDataBreaches.Net
1 month ago
Information security

Watsonville Community Hospital had a data breach - or two. It would be helpful to know which. - DataBreaches.Net

#raas
fromIT Pro
1 month ago
Information security

Rocketing number of ransomware groups as new, smaller players emerge

fromDataBreaches.Net
1 month ago
Information security

DragonForce, LockBit, and Qilin, a new triad aims to dominate the ransomware landscape - DataBreaches.Net

fromIT Pro
1 month ago
Information security

Rocketing number of ransomware groups as new, smaller players emerge

fromDataBreaches.Net
1 month ago
Information security

DragonForce, LockBit, and Qilin, a new triad aims to dominate the ransomware landscape - DataBreaches.Net

Information security
fromComputerWeekly.com
1 month ago

Warlock ransomware may be linked to Chinese state | Computer Weekly

Warlock ransomware, exploiting ToolShell SharePoint vulnerabilities, is likely linked to Chinese state-sponsored APTs Linen Typhoon and Violet Typhoon.
Privacy professionals
fromDataBreaches.Net
1 month ago

Missing Risk Analysis Cost NY CPA Firm $175K-But Not the Big Group Whose Data Was Breached in 2019 - DataBreaches.Net

An accounting firm acting as a business associate incurred a $175,000 OCR HIPAA settlement after a 2019 PHI breach, highlighting recurring ransomware and risk-analysis issues.
US news
fromDataBreaches.Net
1 month ago

Policyholder Plot Twist: Cyber Insurer Sues Policyholder's Cyber Pros - DataBreaches.Net

Ace American sued CoWorx's cybersecurity vendors alleging negligence and breach of contract to recover $500,000 paid under its cyber insurance policy.
Information security
fromTheregister
1 month ago

3 infamous ransomware crews collab to 'maximize income'

Three major ransomware-as-a-service groups — DragonForce, Qilin, and LockBit — formed a coalition to coordinate attacks, reduce conflicts, and maximize collective profits.
#cybercrime
Information security
fromThe Hacker News
1 month ago

LockBit, Qilin, and DragonForce Join Forces to Dominate the Ransomware Ecosystem

DragonForce, LockBit, and Qilin formed a strategic ransomware alliance to share techniques, resources, and infrastructure, amplifying ransomware capabilities and risk to critical infrastructure.
fromDataBreaches.Net
1 month ago

Salesforce Tells Clients It Won't Pay Hackers for Extortion - DataBreaches.Net

Salesforce Inc. told customers Tuesday that it won't pay a ransom demand from a hacker who claimed to have stolen a large amount of client data and threatened to publish it, according to an email seen by Bloomberg News. The company said in a security notification that it had received "credible threat intelligence" indicating that a hacking group, known as ShinyHunters, was planning to share information stolen during a security incident earlier in the year involving a number of its customers, according to the email.
Information security
fromTheregister
1 month ago

Teens arrested in London preschool ransomware attack

In a very aggressive - and disgusting - attempt to extort a ransom payment from Kido, the criminals published profiles of 10 children, including photos, names, and home addresses, along with their parents' contact details and in some cases places of work, threatening to expose more if the ransom demand wasn't met. A new crime crew calling itself the Radiant Group claimed responsibility for the attack, and posted the preschool's name, along with its pupils' profiles, as the first leak on its dark web site. The ransomware gang later deleted the kids' and parents' data, apparently under pressure from other criminals - but not before some of the parents reported receiving threatening calls.
UK news
Information security
fromTheregister
1 month ago

Microsoft blames Medusa affiliates for GoAnywhere exploits

Medusa-linked attackers exploited a critical deserialization flaw in Fortra's GoAnywhere MFT (CVE-2025-10035) to enable code execution, deploy RMM tools, and maintain persistence.
UK news
fromwww.theguardian.com
1 month ago

Six out of 10 UK secondary schools hit by cyber-attack or breach in past year

UK educational institutions face disproportionately high cyber-attacks, with schools and universities frequently targeted by phishing, access-broker-facilitated breaches, and ransomware.
Information security
fromTheregister
1 month ago

No suds for you! Asahi attack leaves Japanese drinkers dry

A ransomware attack disabled Asahi's Japanese distribution and call-center systems, forcing manual order processing and causing domestic supply shortages while investigations continue.
#cyberattack
Information security
fromTechCrunch
1 month ago

Hackers are sending extortion emails to executives after claiming Oracle apps' data breach | TechCrunch

Clop-linked hackers claim to have stolen sensitive data from Oracle E-Business Suite and are sending extortion emails to executives at numerous large organizations.
fromTheregister
1 month ago

Google Drive gets new ransomware detection feature

The model, which the Chocolate Factory boasts has been "trained on millions of real-world ransomware samples," looks for signs that may indicate ransomware - such as attempts to encrypt or corrupt large numbers of files - and then pauses syncing of affected files, helping prevent wider spread. Drive for desktop is Google's sync app for Windows and macOS that keeps local files in step with cloud storage.
Artificial intelligence
Information security
fromAbove the Law
1 month ago

When Ransomware Meets AI: The Next Frontier Of Cyber Extortion - Above the Law

Generative AI dramatically lowers the technical barrier to ransomware, creating fast, automated attacks that pose legal, operational, and reputational threats to law firms and clients.
[ Load more ]