#ransomware

[ follow ]
#cybersecurity
fromNextgov.com
1 day ago
Healthcare

Former FBI official proposes terror designations for ransomware hackers targeting hospitals

Law
fromTheregister
23 hours ago

Third ransomware pro pleads guilty to cybercrime U-turn

Angelo Martino pleaded guilty to aiding the ALPHV/BlackCat ransomware gang in extorting US businesses.
Information security
fromwww.theguardian.com
9 hours ago

UK could face hacktivist attacks at scale', says head of security agency

The UK may face large-scale hacktivist attacks during conflicts, similar to recent ransomware incidents, with no option to pay ransoms for recovery.
Healthcare
fromTheregister
17 hours ago

Ex-FBI lead urges homicide charges against ransomware scum

Cyberattacks causing death should be treated as murder, urging felony homicide charges against ransomware actors targeting healthcare facilities.
Healthcare
fromNextgov.com
1 day ago

Former FBI official proposes terror designations for ransomware hackers targeting hospitals

Ransomware actors targeting critical infrastructure may be designated as terrorists, allowing for expanded legal actions against them.
Law
fromTheregister
23 hours ago

Third ransomware pro pleads guilty to cybercrime U-turn

Angelo Martino pleaded guilty to aiding the ALPHV/BlackCat ransomware gang in extorting US businesses.
Information security
fromThe Hacker News
18 hours ago

SystemBC C2 Server Reveals 1,570+ Victims in The Gentlemen Ransomware Operation

The Gentlemen ransomware group uses SystemBC malware to target over 1,570 victims, employing sophisticated tactics for initial access and lateral movement.
#cybercrime
Law
fromThe Hacker News
22 hours ago

Ransomware Negotiator Pleads Guilty to Aiding BlackCat Attacks in 2023

A ransomware negotiator pleaded guilty to aiding BlackCat ransomware attacks against U.S. companies in 2023.
Law
fromThe Hacker News
22 hours ago

Ransomware Negotiator Pleads Guilty to Aiding BlackCat Attacks in 2023

A ransomware negotiator pleaded guilty to aiding BlackCat ransomware attacks against U.S. companies in 2023.
#data-breach
Healthcare
fromSecurityWeek
1 day ago

Data Breaches at Healthcare Organizations in Illinois and Texas Affect 600,000

Three US healthcare organizations reported data breaches affecting nearly 600,000 individuals, with significant incidents in Texas and Illinois.
Healthcare
fromSecurityWeek
6 days ago

Data Breach at Tennessee Hospital Affects 337,000

Cookeville Regional Medical Center experienced a ransomware attack, compromising data of over 337,000 individuals, including sensitive personal and medical information.
Information security
fromTheregister
6 days ago

McGraw Hill linked to 13.5M-record data leak

McGraw Hill experienced a data breach exposing 13.5 million records due to a Salesforce misconfiguration, leading to personal information circulating online.
Los Angeles
fromLos Angeles Times
1 week ago

How thousands of sensitive LAPD files got leaked online - and what happens next

A significant data breach exposed sensitive LAPD files and other records, attributed to the hacking group WorldLeaks.
Privacy professionals
fromSecurityWeek
2 weeks ago

Wynn Resorts Says 21,000 Employees Affected by ShinyHunters Hack

Wynn Resorts confirmed a data breach affecting over 21,000 individuals, with hackers stealing employee data and likely receiving ransom payment.
Privacy professionals
fromSecurityWeek
1 month ago

Marquis Data Breach Affects 672,000 Individuals

Marquis, a marketing and compliance provider for financial institutions, disclosed a data breach affecting approximately 672,000 individuals, with stolen personal and financial information including SSNs, addresses, and payment card numbers.
Healthcare
fromSecurityWeek
1 day ago

Data Breaches at Healthcare Organizations in Illinois and Texas Affect 600,000

Three US healthcare organizations reported data breaches affecting nearly 600,000 individuals, with significant incidents in Texas and Illinois.
Healthcare
fromSecurityWeek
6 days ago

Data Breach at Tennessee Hospital Affects 337,000

Cookeville Regional Medical Center experienced a ransomware attack, compromising data of over 337,000 individuals, including sensitive personal and medical information.
Information security
fromTheregister
6 days ago

McGraw Hill linked to 13.5M-record data leak

McGraw Hill experienced a data breach exposing 13.5 million records due to a Salesforce misconfiguration, leading to personal information circulating online.
Los Angeles
fromLos Angeles Times
1 week ago

How thousands of sensitive LAPD files got leaked online - and what happens next

A significant data breach exposed sensitive LAPD files and other records, attributed to the hacking group WorldLeaks.
Privacy professionals
fromSecurityWeek
2 weeks ago

Wynn Resorts Says 21,000 Employees Affected by ShinyHunters Hack

Wynn Resorts confirmed a data breach affecting over 21,000 individuals, with hackers stealing employee data and likely receiving ransom payment.
Privacy professionals
fromSecurityWeek
1 month ago

Marquis Data Breach Affects 672,000 Individuals

Marquis, a marketing and compliance provider for financial institutions, disclosed a data breach affecting approximately 672,000 individuals, with stolen personal and financial information including SSNs, addresses, and payment card numbers.
Information security
fromTheregister
1 day ago

Adaptavist Group breach: Ransomware crew claims mega-haul

Adaptavist Group is investigating a security breach involving stolen credentials, while a ransomware group claims to have accessed extensive data.
fromTheregister
6 days ago

Autovista blames ransomware for service disruption

"We know that getting this resolved quickly is important to you. Our top priority is to securely restore impacted applications, although we do not have a firm timeline on this yet."
EU data protection
Information security
fromTheregister
1 week ago

Ransomware scum, other crims exploit 4 old Microsoft bugs

Four Microsoft vulnerabilities are actively exploited, including one from 2012, prompting CISA to urge federal agencies to patch them within two weeks.
Information security
fromThe Hacker News
1 week ago

ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories

A new variant of the Phorpiex botnet combines traditional and peer-to-peer communication, facilitating sophisticated malware operations and high-volume spam.
fromTheregister
2 weeks ago

Ransomware knocks Dutch healthcare software vendor offline

On April 7, 2026, Z-CERT received notification that ChipSoft has fallen victim to a ransomware attack. Z-CERT is in contact with ChipSoft, healthcare institutions, and our partners. We are working hard to assess the impact of the incident.
Healthcare
Germany news
fromThe Hacker News
2 weeks ago

BKA Identifies REvil Leaders Behind 130 German Ransomware Attacks

Germany's BKA identified Daniil Shchukin and Anatoly Kravchuk as key figures behind the REvil ransomware operation, linked to numerous attacks and significant financial losses.
#cyberattack
East Bay (California)
fromSFGATE
3 weeks ago

Bay Area city remains paralyzed week after cyberattack

Foster City is experiencing a significant disruption due to a ransomware cyberattack, affecting communication and services for over a week.
Privacy professionals
fromSFGATE
1 month ago

Bay Area city paralyzed by cyberattack

A ransomware attack has paralyzed Foster City's government and potentially compromised public data, prompting officials to declare a state of emergency.
East Bay (California)
fromSFGATE
3 weeks ago

Bay Area city remains paralyzed week after cyberattack

Foster City is experiencing a significant disruption due to a ransomware cyberattack, affecting communication and services for over a week.
Privacy professionals
fromSFGATE
1 month ago

Bay Area city paralyzed by cyberattack

A ransomware attack has paralyzed Foster City's government and potentially compromised public data, prompting officials to declare a state of emergency.
Information security
fromSecurityWeek
3 weeks ago

Stolen Logins Are Fueling Everything From Ransomware to Nation-State Cyberattacks

Stolen credentials significantly enhance ransomware attacks, enabling illegitimate access and operational disruption within networks.
Information security
fromThe Hacker News
4 weeks ago

Tax Search Ads Deliver ScreenConnect Malware Using Huawei Driver to Disable EDR

A malvertising campaign targets U.S. individuals searching for tax documents, delivering rogue installers that blind security programs using BYOVD techniques.
Information security
fromTechzine Global
1 month ago

Cohesity embeds Sophos malware scanning in Data Cloud

Cohesity integrates Sophos malware scanning into Data Cloud to detect hidden threats in backup data, enhancing recovery confidence post-cyberattacks.
fromThe Hacker News
1 month ago

54 EDR Killers Use BYOVD to Exploit 34 Signed Vulnerable Drivers and Disable Security

Ransomware gangs, especially those with ransomware-as-a-service (RaaS) programs, frequently produce new builds of their encryptors, and ensuring that each new build is reliably undetected can be time-consuming. More importantly, encryptors are inherently very noisy (as they inherently need to modify a large number of files in a short period); making such malware undetected is rather challenging.
Information security
Information security
fromSecurityWeek
1 month ago

Cisco Firewall Vulnerability Exploited as Zero-Day in Interlock Ransomware Attacks

Cisco firewall vulnerability CVE-2026-20131 was exploited as a zero-day by Interlock cybercrime group since January 26, before the March 4 patch announcement.
Information security
fromThe Hacker News
1 month ago

Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access

Interlock ransomware exploits critical Cisco Secure Firewall vulnerability CVE-2026-20131 as zero-day since January 26, 2026, enabling unauthenticated remote code execution with root privileges.
Information security
fromThe Hacker News
1 month ago

Hive0163 Uses AI-Assisted Slopoly Malware for Persistent Access in Ransomware Attacks

AI-generated malware Slopoly enables threat actors to develop malware frameworks significantly faster, demonstrating the weaponization of AI for cybercriminal purposes.
Information security
fromThe Hacker News
1 month ago

CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited

CISA added three actively exploited vulnerabilities to its KEV catalog, including critical flaws in SolarWinds Web Help Desk, Omnissa Workspace One UEM, and Ivanti Endpoint Manager, with federal agencies required to patch by mid-to-late March 2026.
US news
fromSecurityWeek
1 month ago

Russian Ransomware Operator Pleads Guilty in US

Russian national Evgenii Ptitsyn pleaded guilty to wire fraud conspiracy for his role in the Phobos ransomware operation, facing up to 20 years in prison.
Information security
fromThe Hacker News
1 month ago

Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

Threat actors impersonate IT support via email and phone calls to deliver Havoc C2 framework for data exfiltration or ransomware attacks across multiple organizations.
Information security
fromTheregister
1 month ago

Double whammy: Steaelite RAT bundles data theft, ransomware

Steaelite, a new remote access trojan sold on cybercrime networks, enables double extortion attacks on Windows machines through ransomware, data theft, credential stealing, and live surveillance controlled via a centralized browser-based dashboard.
Information security
fromDataBreaches.Net
1 month ago

Extorting the Extorters? Moscow man accused of posing as FSB officer to extort Conti ransomware gang - DataBreaches.Net

A Moscow resident was accused of extorting money from the Conti ransomware group by impersonating an FSB officer and threatening criminal prosecution.
Information security
fromTechzine Global
1 month ago

Why cyberattacks don't require advanced hacking

Poor cyber hygiene, weak identity security, overdue IT maintenance, and incomplete logging make organizations vulnerable to financially motivated attacks such as ransomware and email fraud.
#healthcare-cybersecurity
fromFuturism
1 month ago

AI Is Destroying Grocery Supply Chains

Whole Foods shelves sit empty after a data breach shut down its wholesale distributor. Meat packers working for JBS Foods are paralyzed as an $11 million ransomware attack takes out their processing facilities. Some 2.2 million workers at Stop & Shop and Hannaford have their personal data exposed as the result of a cyberattack on parent company Ahold Delhaize USA. These scenarios, straight from a William Gibson novel, are becoming increasingly common in supply chains across the world.
Food & drink
#cve-2026-1731
Information security
fromDataBreaches.Net
2 months ago

Oklahoma Cheyenne and Arapaho Tribes say ransomware disrupted tribal systems - DataBreaches.Net

Ransomware attack forced Cheyenne and Arapaho Tribes to shut down tribal networks, disrupting communications and suspending some operations while recovery and investigation proceed.
Information security
fromTechzine Global
2 months ago

Cyber attackers hide their tracks by exploiting firewalls

Firewall vulnerabilities enabled 90% of ransomware incidents in 2025, with some attacks encrypting data within three hours and old CVE exploits still active.
Information security
fromTheregister
2 months ago

Polish cops arrest 47-year-old man in Phobos ransomware raid

Polish police arrested a 47-year-old suspected of ties to Phobos after seizing devices containing credentials, payment data, server IPs, and encrypted communications.
fromSecurityWeek
2 months ago

Man Linked to Phobos Ransomware Arrested in Poland

A 47-year-old man arrested by police in Poland for allegedly being involved in cybercriminal activities has been linked to the Phobos ransomware operation. According to Poland's Central Cybercrime Bureau, officers found hacking tools, credentials, payment card numbers, and server IP addresses on the unnamed suspect's devices during a search. They also discovered that the suspect had exchanged messages with the Phobos ransomware group.
Information security
fromTheregister
2 months ago

Infosec exec sold eight zero-day exploit kits to Russia: DoJ

That changed last week when the US Department of Justice published a sentencing memorandum [PDF] that frames Williams' conduct as a betrayal of his employer and the US government, and the cause of significant harm to US national security. Williams "made it possible for the Russian Broker to arm its clients with powerful cyber exploits that could be used against any manner of victim, civilian or military around the world," the DoJ said.
Information security
Education
fromDataBreaches.Net
2 months ago

Cyber Attacks on Schools Plateaued in 2025, but More Records Exposed - DataBreaches.Net

Ransomware attacks on educational institutions remained steady in 2025 while exposed records increased sharply, driven by third-party software vulnerabilities and large higher-education breaches.
#supply-chain-attacks
Information security
fromTheregister
2 months ago

Ransomware crews abuse bossware to blend into networks

Threat actors are abusing legitimate employee monitoring and RMM software to hide in corporate networks and attempt ransomware deployment.
Information security
fromSecurityWeek
2 months ago

Hacktivists, State Actors, Cybercriminals Target Global Defense Industry, Google Warns

Hacktivists, state-sponsored actors, and cybercriminals are intensifying attacks on the global defense industrial base using espionage, ransomware, and LLM-assisted techniques.
fromThe Hacker News
2 months ago

Reynolds Ransomware Embeds BYOVD Driver to Disable EDR Security Tools

Cybersecurity researchers have disclosed details of an emergent ransomware family dubbed Reynolds that comes embedded with a built-in bring your own vulnerable driver (BYOVD) component for defense evasion purposes within the ransomware payload itself. BYOVD refers to an adversarial technique that abuses legitimate but flawed driver software to escalate privileges and disable Endpoint Detection and Response (EDR) solutions so that malicious activities go unnoticed. The strategy has been adopted by many ransomware groups over the years.
Information security
fromThe Hacker News
2 months ago

From Ransomware to Residency: Inside the Rise of the Digital Parasite

To be clear, ransomware isn't going anywhere, and adversaries continue to innovate. But the data shows a clear strategic pivot away from loud, destructive attacks toward techniques designed to evade detection, persist inside environments, and quietly exploit identity and trusted infrastructure. Rather than breaking in and burning systems down, today's attackers increasingly behave like Digital Parasites. They live inside the host, feed on credentials and services, and remain undetected for as long as possible.
Information security
fromZDNET
2 months ago

This new 'sleeperware' doesn't set off alarms or crash your system - it sneaks in and waits

In its annual Red Report, a body of research that analyzes real-world attacker techniques using large-scale attack simulation data, Picus Labs warns cybersecurity professionals that threat actors are rapidly shifting away from ransomware encryption to parasitic "sleeperware" extortion as their means to loot organizations for millions of dollars per attack. Released today and now in its sixth year, the 278-page Red Report gets its name from Picus-organized cybersecurity exercises that take the perspective of the attacker's team, otherwise known as the "red team."
Information security
#smartermail
Information security
fromSecuritymagazine
2 months ago

Understanding Breaches Before and After They Happen: What Every Organization Should Know

Most security breaches result from neglected fundamentals—human error, unpatched systems, weak authentication, and poor network segmentation—rather than advanced, novel exploits.
Information security
fromSecurityWeek
2 months ago

Ransomware Groups May Pivot Back to Encryption as Data Theft Tactics Falter

Ransomware groups find pure data exfiltration less profitable; attackers are shifting back to encryption to regain leverage as victim payment rates fall.
[ Load more ]