When Microsoft patched a vulnerability last summer that allowed threat actors to use Windows’ shortcut (.lnk) files in ...
Ransomware groups are back at encrypting victim data for extortion, in addition to exfiltrating it, increasing chances of ...
Workforce monitoring software was abused in two cases of attempted ransomware attacks, researchers from Huntress found.
As ransomware recedes, a new more dangerous digital parasite rises ...
Gang walks away with nothing, victims are left with irreparable hypervisors Cybersecurity experts usually advise victims ...
Researchers revealed a Phorpiex-distributed phishing campaign using malicious LNK files to deploy Global Group ransomware ...
Nitrogen ransomware’s ESXi encryptor corrupts its own public key, making file recovery impossible, even if victims pay.
When corporate data is exposed on a dedicated leak site, the consequences linger long after the attack fades from the news cycle.
A state vendor and major provider of workers’ compensation insurance in Rhode Island confirmed it was the victim of a ...
For years, security teams treated ransomware as a technological problem. Security teams hardened backup systems, deployed endpoint detection, practiced incident response playbooks built around data ...
DragonForce is taking cues from organized crime, emphasizing cooperation and coordination among ransomware gangs.