#ransomware

[ follow ]
Information security
fromThe Hacker News
6 hours ago

Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

Threat actors impersonate IT support via email and phone calls to deliver Havoc C2 framework for data exfiltration or ransomware attacks across multiple organizations.
#data-breach
Information security
fromTheregister
6 days ago

Wynn Resorts confirms data stolen after ShinyHunters threats

Wynn Resorts confirmed employee data theft and accepted hackers' claim of deletion, raising concerns about whether ransom was paid and data truly destroyed.
Information security
fromSecurityWeek
6 days ago

Wynn Resorts Confirms Data Breach After Hackers Remove It From Leak Site

Wynn Resorts confirmed hackers stole employee data including SSNs from over 800,000 records, but operations remain unaffected and the company claims the stolen data has been deleted.
Privacy professionals
fromTechzine Global
1 day ago

All data from dutch Telco Odido hack now online

ShinyHunters released all stolen data from Odido's 6.5 million customers and 600,000 companies online after the company refused ransom payment, exposing names, addresses, social security numbers, ID documents, and sensitive personal information.
Information security
fromTheregister
4 days ago

Double whammy: Steaelite RAT bundles data theft, ransomware

Steaelite, a new remote access trojan sold on cybercrime networks, enables double extortion attacks on Windows machines through ransomware, data theft, credential stealing, and live surveillance controlled via a centralized browser-based dashboard.
Information security
fromDataBreaches.Net
5 days ago

Extorting the Extorters? Moscow man accused of posing as FSB officer to extort Conti ransomware gang - DataBreaches.Net

A Moscow resident was accused of extorting money from the Conti ransomware group by impersonating an FSB officer and threatening criminal prosecution.
#cyberattack
Information security
fromTechzine Global
1 week ago

Why cyberattacks don't require advanced hacking

Poor cyber hygiene, weak identity security, overdue IT maintenance, and incomplete logging make organizations vulnerable to financially motivated attacks such as ransomware and email fraud.
#healthcare-cybersecurity
fromFuturism
1 week ago

AI Is Destroying Grocery Supply Chains

Whole Foods shelves sit empty after a data breach shut down its wholesale distributor. Meat packers working for JBS Foods are paralyzed as an $11 million ransomware attack takes out their processing facilities. Some 2.2 million workers at Stop & Shop and Hannaford have their personal data exposed as the result of a cyberattack on parent company Ahold Delhaize USA. These scenarios, straight from a William Gibson novel, are becoming increasingly common in supply chains across the world.
Food & drink
#cve-2026-1731
fromDataBreaches.Net
1 week ago
Information security

Hospitals at Risk of BeyondTrust Ransomware Hacks - DataBreaches.Net

Hospitals and clinics must urgently patch CVE-2026-1731 in BeyondTrust Remote Support and Privileged Remote Access to prevent ransomware footholds.
fromSecurityWeek
1 week ago
Information security

BeyondTrust Vulnerability Exploited in Ransomware Attacks

Critical BeyondTrust vulnerability CVE-2026-1731 is being exploited in ransomware attacks, prompting a CISA KEV update and observed malicious activity across multiple sectors and countries.
#cybersecurity
Information security
fromDataBreaches.Net
1 week ago

Oklahoma Cheyenne and Arapaho Tribes say ransomware disrupted tribal systems - DataBreaches.Net

Ransomware attack forced Cheyenne and Arapaho Tribes to shut down tribal networks, disrupting communications and suspending some operations while recovery and investigation proceed.
Information security
fromTechzine Global
1 week ago

Cyber attackers hide their tracks by exploiting firewalls

Firewall vulnerabilities enabled 90% of ransomware incidents in 2025, with some attacks encrypting data within three hours and old CVE exploits still active.
Information security
fromTheregister
2 weeks ago

Polish cops arrest 47-year-old man in Phobos ransomware raid

Polish police arrested a 47-year-old suspected of ties to Phobos after seizing devices containing credentials, payment data, server IPs, and encrypted communications.
fromSecurityWeek
2 weeks ago

Man Linked to Phobos Ransomware Arrested in Poland

A 47-year-old man arrested by police in Poland for allegedly being involved in cybercriminal activities has been linked to the Phobos ransomware operation. According to Poland's Central Cybercrime Bureau, officers found hacking tools, credentials, payment card numbers, and server IP addresses on the unnamed suspect's devices during a search. They also discovered that the suspect had exchanged messages with the Phobos ransomware group.
Information security
fromTheregister
2 weeks ago

Infosec exec sold eight zero-day exploit kits to Russia: DoJ

That changed last week when the US Department of Justice published a sentencing memorandum [PDF] that frames Williams' conduct as a betrayal of his employer and the US government, and the cause of significant harm to US national security. Williams "made it possible for the Russian Broker to arm its clients with powerful cyber exploits that could be used against any manner of victim, civilian or military around the world," the DoJ said.
Information security
Education
fromDataBreaches.Net
2 weeks ago

Cyber Attacks on Schools Plateaued in 2025, but More Records Exposed - DataBreaches.Net

Ransomware attacks on educational institutions remained steady in 2025 while exposed records increased sharply, driven by third-party software vulnerabilities and large higher-education breaches.
#supply-chain-attacks
fromTechRepublic
2 weeks ago
Information security

Ransomware Groups Claimed 2,000 Attacks in Just Three Months

Ransomware attacks surged in 2025 to 6,604 incidents (a 52% increase), with rising supply-chain attacks and sustained high activity into 2026.
fromTheregister
2 weeks ago
Information security

Supply chain breaches fuel cybercrime cycle, report says

Cybercriminals are industrializing supply chain attacks into a self-reinforcing ecosystem combining package compromise, credential theft, identity attacks, and ransomware.
Information security
fromTheregister
2 weeks ago

Ransomware crews abuse bossware to blend into networks

Threat actors are abusing legitimate employee monitoring and RMM software to hide in corporate networks and attempt ransomware deployment.
Information security
fromSecurityWeek
2 weeks ago

Hacktivists, State Actors, Cybercriminals Target Global Defense Industry, Google Warns

Hacktivists, state-sponsored actors, and cybercriminals are intensifying attacks on the global defense industrial base using espionage, ransomware, and LLM-assisted techniques.
fromThe Hacker News
3 weeks ago

Reynolds Ransomware Embeds BYOVD Driver to Disable EDR Security Tools

Cybersecurity researchers have disclosed details of an emergent ransomware family dubbed Reynolds that comes embedded with a built-in bring your own vulnerable driver (BYOVD) component for defense evasion purposes within the ransomware payload itself. BYOVD refers to an adversarial technique that abuses legitimate but flawed driver software to escalate privileges and disable Endpoint Detection and Response (EDR) solutions so that malicious activities go unnoticed. The strategy has been adopted by many ransomware groups over the years.
Information security
fromThe Hacker News
3 weeks ago

From Ransomware to Residency: Inside the Rise of the Digital Parasite

To be clear, ransomware isn't going anywhere, and adversaries continue to innovate. But the data shows a clear strategic pivot away from loud, destructive attacks toward techniques designed to evade detection, persist inside environments, and quietly exploit identity and trusted infrastructure. Rather than breaking in and burning systems down, today's attackers increasingly behave like Digital Parasites. They live inside the host, feed on credentials and services, and remain undetected for as long as possible.
Information security
fromZDNET
3 weeks ago

This new 'sleeperware' doesn't set off alarms or crash your system - it sneaks in and waits

In its annual Red Report, a body of research that analyzes real-world attacker techniques using large-scale attack simulation data, Picus Labs warns cybersecurity professionals that threat actors are rapidly shifting away from ransomware encryption to parasitic "sleeperware" extortion as their means to loot organizations for millions of dollars per attack. Released today and now in its sixth year, the 278-page Red Report gets its name from Picus-organized cybersecurity exercises that take the perspective of the attacker's team, otherwise known as the "red team."
Information security
#smartermail
fromThe Hacker News
3 weeks ago
Information security

Warlock Ransomware Breaches SmarterTools Through Unpatched SmarterMail Server

An unpatched SmarterMail VM allowed the Warlock ransomware group to breach SmarterTools, affecting internal servers and some hosted SmarterTrack customers.
fromSecurityWeek
3 weeks ago
Information security

SmarterTools Hit by Ransomware via Vulnerability in Its Own Product

SmarterTools was breached via an unpatched SmarterMail VM, enabling the Warlock ransomware group to laterally compromise Windows servers and some customer systems.
Information security
fromSecuritymagazine
3 weeks ago

Understanding Breaches Before and After They Happen: What Every Organization Should Know

Most security breaches result from neglected fundamentals—human error, unpatched systems, weak authentication, and poor network segmentation—rather than advanced, novel exploits.
Information security
fromSecurityWeek
3 weeks ago

Ransomware Groups May Pivot Back to Encryption as Data Theft Tactics Falter

Ransomware groups find pure data exfiltration less profitable; attackers are shifting back to encryption to regain leverage as victim payment rates fall.
#cisa
Higher education
fromTechCrunch
3 weeks ago

One of Europe's largest universities knocked offline for days after cyberattack | TechCrunch

La Sapienza University’s computer systems have been offline for three days after an apparent ransomware attack affecting emails and workstations; recovery is underway from backups.
Information security
fromTechCrunch
3 weeks ago

Data breach at govtech giant Conduent balloons, affecting millions more Americans | TechCrunch

A January 2025 ransomware attack on Conduent may have exposed personal data of potentially tens of millions of US residents across multiple states.
Information security
fromTechzine Global
3 weeks ago

Western Europe is a hotbed for cybercriminals' servers

Cybercriminals abuse ISPsystem's VMmanager and 'bulletproof' European hosting to run ransomware on recurring Windows hostnames and evade abuse complaints.
Information security
fromTheregister
3 weeks ago

Nitrogen can't unlock its own ransomware after coding error

Nitrogen's VMware ESXi ransomware corrupts the public key via a stack overlap, making decryption impossible even if victims pay.
Information security
fromComputerWeekly.com
4 weeks ago

Ransomware gangs focus on winning hearts and minds | Computer Weekly

Ransomware gangs are professionalizing, scaling affiliate models, recruiting insiders and cyber professionals, and offering larger commissions and better OpSec to enable more successful attacks.
Information security
fromSecurityWeek
4 weeks ago

Over 1,400 MongoDB Databases Ransacked by Threat Actor

1,416 of 3,100 internet-exposed MongoDB databases were compromised and replaced with ransom notes demanding about $500 in Bitcoin per incident.
Information security
fromTechCrunch
1 month ago

Fintech firm Marquis blames hack at firewall provider SonicWall for its data breach | TechCrunch

Marquis attributes an August 2025 ransomware attack to credential exposure from its firewall provider SonicWall's cloud backup breach and plans to seek compensation.
#healthcare-data-breach
#ramp
Information security
fromArs Technica
1 month ago

Site catering to online criminals has been seized by the FBI

The FBI seized RAMP, a major Russian-language ransomware marketplace with over 14,000 vetted users, disrupting a significant cybercrime forum and its operations.
Information security
fromDataBreaches.Net
1 month ago

France's Waltio faces ransom threat from notorious hacker collective - DataBreaches.Net

Waltio faces a ShinyHunters ransom threat claiming nearly 50,000 users' data and threatening to leak 2024 tax reports, while core systems remain secure.
Canada news
fromwww.cbc.ca
1 month ago

More criminals are using AI for ransomware attacks, cybersecurity centre warns | CBC News

Ransomware attacks in Canada are increasing and evolving rapidly, with criminals using AI to identify vulnerabilities, create malware, and automate extortion.
fromComputerWeekly.com
1 month ago

Broken decryptor leaves Sicarii ransomware victims adrift | Computer Weekly

A coding error, possibly introduced thanks to over-reliance on artificial intelligence (AI) vibe coding tools, has rendered an emergent strain of ransomware an acutely dangerous threat, according to researchers at Halcyon's Ransomware Research Center (RRC). The Sicarii ransomware-as-a-service (RaaS) operation emerged from the cyber criminal underground in December 2025, when it started advertising for affiliates on the dark web.
Information security
Information security
fromThe Hacker News
1 month ago

Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware

Multi-stage phishing campaign targets Russian users, using social-engineered documents, cloud-hosted loaders, Defender-disable tricks, and deployments of Amnesia RAT and ransomware.
Information security
fromSecurityWeek
1 month ago

Nike Probing Potential Security Incident as Hackers Threaten to Leak Data

Nike is investigating a potential cybersecurity incident after WorldLeaks listed Nike as a victim and threatened to publish alleged stolen data unless paid.
Information security
fromChannelPro
1 month ago

Ransomware is on the rise. Again

Ransomware is resurging with smarter, AI-augmented attacks that leverage phishing, credential theft, and identity/access exploitation, pressuring defenders and creating MSP opportunities.
Information security
fromTechzine Global
1 month ago

New Windows backdoor emerges in ransomware attack

PDFSider is a stealthy Windows backdoor deployed via social engineering and DLL side-loading to provide persistent, encrypted access and data exfiltration over DNS.
#cybercrime
fromFortune
2 months ago
Information security

Feds are hunting teenage hacking groups like 'Scattered Spider' who have targeted $1 trillion worth of the Fortune 500 since 2022 | Fortune

fromFortune
2 months ago
Information security

Feds are hunting teenage hacking groups like 'Scattered Spider' who have targeted $1 trillion worth of the Fortune 500 since 2022 | Fortune

#black-basta
fromDataBreaches.Net
1 month ago

HHS OCR comments on its 2026 priorities - DataBreaches.Net

OCR continues to execute its enforcement mission under its statutory and regulatory authorities regarding civil rights, exercise of conscience, and health information privacy and security, and breach notification. OCR continues to investigate complaints filed, to conduct compliance reviews, and to review breaches of unsecured protected health information. OCR will be responsive to the HIPAA trends and compliance issues within OCR's jurisdiction that are affecting the public and the regulated industry.
Privacy professionals
Information security
fromTheregister
1 month ago

DeadLock ransomware uses smart contracts to evade defenders

DeadLock ransomware uses Polygon smart contracts and decentralized messaging wrappers to rotate proxy URLs and evade detection while relying on encryption-only extortion.
Public health
fromDataBreaches.Net
1 month ago

University of Hawaii Cancer Center: Hackers Stole Research Files, Encrypted Data - DataBreaches.Net

Ransomware attackers stole data from University of Hawaii Cancer Center studies from the 1990s, and the center paid a ransom for a decryptor key.
fromComputerWeekly.com
1 month ago

Business leaders see AI risks and fraud outpacing ransomware, says WEF | Computer Weekly

Midway through a decade that is coming to be defined by the runaway acceleration of technological change, the threat of ransomware attacks seems to be dropping down the agenda in boardrooms around the world, with C-suite executives more concerned about growing risks arising from artificial intelligence (AI) vulnerabilities, cyber-enabled fraud and phishing attacks, disruption to supply chains, and exploitation of software vulnerabilities.
Information security
Information security
fromDataBreaches.Net
1 month ago

CrazyHunter ransomware escalates with advanced intrusion tactics, six Taiwan healthcare victims confirmed - DataBreaches.Net

CrazyHunter ransomware, a Go-based Prince fork, has rapidly evolved with advanced intrusion and evasion capabilities, targeting Taiwanese healthcare providers and leaking stolen data.
France news
fromDataBreaches.Net
1 month ago

Basketball player arrested for alleged ransomware ties freed in Russia-France prisoner swap - DataBreaches.Net

Daniil Kasatkin, a Russian basketball player accused of negotiating for a ransomware gang, was freed in a prisoner exchange between Russia and France.
World news
fromTheregister
1 month ago

France swaps alleged ransomware crook for conflict researche

France exchanged an alleged US-wanted ransomware suspect for pardoned French researcher Laurent Vinatier, who was released from a Russian prison.
Information security
fromThe Hacker News
1 month ago

Cybersecurity Predictions 2026: The Hype We Can Ignore (And the Risks We Can't)

Organizations must prioritize evidence-based cybersecurity predictions focusing on targeted ransomware, internal AI-related risks, and skepticism about AI-orchestrated attacks.
fromTheregister
1 month ago

Ransomware attacks kept climbing in 2025

Trackers keeping an eye on ransomware leak sites logged more than 8,000 claimed victims worldwide in 2025, a rise of more than 50 percent compared to 2023. The counts come from outfits watching dark web shaming pages such as Ransomware.live and RansomLook.io, so they only include cases where crooks decided to post receipts. Plenty of victims, Emsisoft says, will have paid up, recovered, or kept quiet without ever appearing on a leak site.
Information security
#healthcare
fromTheregister
1 month ago

King Charles gives award to LockBit takedown architect

The National Crime Agency's (NCA) Gavin Webb was among the names on the King's most recent New Year Honours list for 2026. Webb was given an Officer of the Order of the British Empire (OBE) award.
Miscellaneous
Information security
fromComputerworld
1 month ago

US cybersecurity experts plead guilty to attacking US companies with ransomware

Two cybersecurity professionals pleaded guilty to conspiring to use BlackCat ransomware to extort multiple U.S. victims and will be sentenced March 12, 2026.
#alphv-blackcat
fromDataBreaches.Net
2 months ago
US news

Two Cybersecurity Professionals Plead Guilty to Targeting Multiple U.S. Victims Using ALPHV BlackCat Ransomware - DataBreaches.Net

fromDataBreaches.Net
2 months ago
US news

Two Cybersecurity Professionals Plead Guilty to Targeting Multiple U.S. Victims Using ALPHV BlackCat Ransomware - DataBreaches.Net

Information security
fromTechzine Global
2 months ago

Security experts themselves carried out ransomware attacks

Two U.S. cybersecurity employees pleaded guilty to using BlackCat/ALPHV ransomware to extort victims, launder proceeds, and face up to 20 years in prison.
Information security
fromSocial Media Explorer
2 months ago

Is Your Bank Prepared for the Next Big Cybersecurity Threat? - Social Media Explorer

Preparedness through managed IT services and proactive security is essential for banks to counter evolving cyber threats like ransomware and spear-phishing.
Information security
fromThe Verge
2 months ago

Two cybersecurity employees plead guilty to carrying out ransomware attacks

Two former cybersecurity employees pleaded guilty to using ALPHV/BlackCat ransomware to extort $1.2 million and target multiple U.S. companies in 2023.
Information security
fromAxios
2 months ago

Why hackers love the holidays

Attackers exploit reduced holiday security staffing to carry out phishing, ransomware, and data theft, so organizations must harden defenses before holidays.
World news
fromThe Hacker News
2 months ago

INTERPOL Arrests 574 in Africa; Ukrainian Ransomware Affiliate Pleads Guilty

Operation Sentinel recovered $3 million, arrested 574 suspects across 19 African countries, removed over 6,000 malicious links, and decrypted six ransomware variants.
Miscellaneous
fromTheregister
2 months ago

1,000 systems pwned in Romanian Waters ransomware attack

A ransomware attack encrypted files on about 1,000 systems across Romania's water management administration, affecting multiple servers while hydrotechnical operations continue locally.
[ Load more ]