#ransomware

[ follow ]
#data-breach
#cyberattack
Information security
fromTechzine Global
2 days ago

Why cyberattacks don't require advanced hacking

Poor cyber hygiene, weak identity security, overdue IT maintenance, and incomplete logging make organizations vulnerable to financially motivated attacks such as ransomware and email fraud.
#healthcare-cybersecurity
fromFuturism
3 days ago

AI Is Destroying Grocery Supply Chains

Whole Foods shelves sit empty after a data breach shut down its wholesale distributor. Meat packers working for JBS Foods are paralyzed as an $11 million ransomware attack takes out their processing facilities. Some 2.2 million workers at Stop & Shop and Hannaford have their personal data exposed as the result of a cyberattack on parent company Ahold Delhaize USA. These scenarios, straight from a William Gibson novel, are becoming increasingly common in supply chains across the world.
Food & drink
#cve-2026-1731
fromDataBreaches.Net
5 days ago
Information security

Hospitals at Risk of BeyondTrust Ransomware Hacks - DataBreaches.Net

Hospitals and clinics must urgently patch CVE-2026-1731 in BeyondTrust Remote Support and Privileged Remote Access to prevent ransomware footholds.
fromSecurityWeek
5 days ago
Information security

BeyondTrust Vulnerability Exploited in Ransomware Attacks

Critical BeyondTrust vulnerability CVE-2026-1731 is being exploited in ransomware attacks, prompting a CISA KEV update and observed malicious activity across multiple sectors and countries.
#cybersecurity
Information security
fromDataBreaches.Net
1 week ago

Oklahoma Cheyenne and Arapaho Tribes say ransomware disrupted tribal systems - DataBreaches.Net

Ransomware attack forced Cheyenne and Arapaho Tribes to shut down tribal networks, disrupting communications and suspending some operations while recovery and investigation proceed.
Information security
fromTechzine Global
1 week ago

Cyber attackers hide their tracks by exploiting firewalls

Firewall vulnerabilities enabled 90% of ransomware incidents in 2025, with some attacks encrypting data within three hours and old CVE exploits still active.
Information security
fromTheregister
1 week ago

Polish cops arrest 47-year-old man in Phobos ransomware raid

Polish police arrested a 47-year-old suspected of ties to Phobos after seizing devices containing credentials, payment data, server IPs, and encrypted communications.
fromSecurityWeek
1 week ago

Man Linked to Phobos Ransomware Arrested in Poland

A 47-year-old man arrested by police in Poland for allegedly being involved in cybercriminal activities has been linked to the Phobos ransomware operation. According to Poland's Central Cybercrime Bureau, officers found hacking tools, credentials, payment card numbers, and server IP addresses on the unnamed suspect's devices during a search. They also discovered that the suspect had exchanged messages with the Phobos ransomware group.
Information security
fromTheregister
1 week ago

Infosec exec sold eight zero-day exploit kits to Russia: DoJ

That changed last week when the US Department of Justice published a sentencing memorandum [PDF] that frames Williams' conduct as a betrayal of his employer and the US government, and the cause of significant harm to US national security. Williams "made it possible for the Russian Broker to arm its clients with powerful cyber exploits that could be used against any manner of victim, civilian or military around the world," the DoJ said.
Information security
Education
fromDataBreaches.Net
1 week ago

Cyber Attacks on Schools Plateaued in 2025, but More Records Exposed - DataBreaches.Net

Ransomware attacks on educational institutions remained steady in 2025 while exposed records increased sharply, driven by third-party software vulnerabilities and large higher-education breaches.
#supply-chain-attacks
fromTechRepublic
1 week ago
Information security

Ransomware Groups Claimed 2,000 Attacks in Just Three Months

Ransomware attacks surged in 2025 to 6,604 incidents (a 52% increase), with rising supply-chain attacks and sustained high activity into 2026.
fromTheregister
1 week ago
Information security

Supply chain breaches fuel cybercrime cycle, report says

Cybercriminals are industrializing supply chain attacks into a self-reinforcing ecosystem combining package compromise, credential theft, identity attacks, and ransomware.
Information security
fromTheregister
1 week ago

Ransomware crews abuse bossware to blend into networks

Threat actors are abusing legitimate employee monitoring and RMM software to hide in corporate networks and attempt ransomware deployment.
Information security
fromSecurityWeek
1 week ago

Hacktivists, State Actors, Cybercriminals Target Global Defense Industry, Google Warns

Hacktivists, state-sponsored actors, and cybercriminals are intensifying attacks on the global defense industrial base using espionage, ransomware, and LLM-assisted techniques.
fromThe Hacker News
2 weeks ago

Reynolds Ransomware Embeds BYOVD Driver to Disable EDR Security Tools

Cybersecurity researchers have disclosed details of an emergent ransomware family dubbed Reynolds that comes embedded with a built-in bring your own vulnerable driver (BYOVD) component for defense evasion purposes within the ransomware payload itself. BYOVD refers to an adversarial technique that abuses legitimate but flawed driver software to escalate privileges and disable Endpoint Detection and Response (EDR) solutions so that malicious activities go unnoticed. The strategy has been adopted by many ransomware groups over the years.
Information security
fromThe Hacker News
2 weeks ago

From Ransomware to Residency: Inside the Rise of the Digital Parasite

To be clear, ransomware isn't going anywhere, and adversaries continue to innovate. But the data shows a clear strategic pivot away from loud, destructive attacks toward techniques designed to evade detection, persist inside environments, and quietly exploit identity and trusted infrastructure. Rather than breaking in and burning systems down, today's attackers increasingly behave like Digital Parasites. They live inside the host, feed on credentials and services, and remain undetected for as long as possible.
Information security
fromZDNET
2 weeks ago

This new 'sleeperware' doesn't set off alarms or crash your system - it sneaks in and waits

In its annual Red Report, a body of research that analyzes real-world attacker techniques using large-scale attack simulation data, Picus Labs warns cybersecurity professionals that threat actors are rapidly shifting away from ransomware encryption to parasitic "sleeperware" extortion as their means to loot organizations for millions of dollars per attack. Released today and now in its sixth year, the 278-page Red Report gets its name from Picus-organized cybersecurity exercises that take the perspective of the attacker's team, otherwise known as the "red team."
Information security
#smartermail
fromThe Hacker News
2 weeks ago
Information security

Warlock Ransomware Breaches SmarterTools Through Unpatched SmarterMail Server

An unpatched SmarterMail VM allowed the Warlock ransomware group to breach SmarterTools, affecting internal servers and some hosted SmarterTrack customers.
fromSecurityWeek
2 weeks ago
Information security

SmarterTools Hit by Ransomware via Vulnerability in Its Own Product

SmarterTools was breached via an unpatched SmarterMail VM, enabling the Warlock ransomware group to laterally compromise Windows servers and some customer systems.
Information security
fromSecuritymagazine
2 weeks ago

Understanding Breaches Before and After They Happen: What Every Organization Should Know

Most security breaches result from neglected fundamentals—human error, unpatched systems, weak authentication, and poor network segmentation—rather than advanced, novel exploits.
Information security
fromSecurityWeek
2 weeks ago

Ransomware Groups May Pivot Back to Encryption as Data Theft Tactics Falter

Ransomware groups find pure data exfiltration less profitable; attackers are shifting back to encryption to regain leverage as victim payment rates fall.
#cisa
Higher education
fromTechCrunch
2 weeks ago

One of Europe's largest universities knocked offline for days after cyberattack | TechCrunch

La Sapienza University’s computer systems have been offline for three days after an apparent ransomware attack affecting emails and workstations; recovery is underway from backups.
Information security
fromTechCrunch
2 weeks ago

Data breach at govtech giant Conduent balloons, affecting millions more Americans | TechCrunch

A January 2025 ransomware attack on Conduent may have exposed personal data of potentially tens of millions of US residents across multiple states.
Information security
fromTechzine Global
2 weeks ago

Western Europe is a hotbed for cybercriminals' servers

Cybercriminals abuse ISPsystem's VMmanager and 'bulletproof' European hosting to run ransomware on recurring Windows hostnames and evade abuse complaints.
Information security
fromTheregister
3 weeks ago

Nitrogen can't unlock its own ransomware after coding error

Nitrogen's VMware ESXi ransomware corrupts the public key via a stack overlap, making decryption impossible even if victims pay.
Information security
fromComputerWeekly.com
3 weeks ago

Ransomware gangs focus on winning hearts and minds | Computer Weekly

Ransomware gangs are professionalizing, scaling affiliate models, recruiting insiders and cyber professionals, and offering larger commissions and better OpSec to enable more successful attacks.
Information security
fromSecurityWeek
3 weeks ago

Over 1,400 MongoDB Databases Ransacked by Threat Actor

1,416 of 3,100 internet-exposed MongoDB databases were compromised and replaced with ransom notes demanding about $500 in Bitcoin per incident.
Information security
fromTechCrunch
3 weeks ago

Fintech firm Marquis blames hack at firewall provider SonicWall for its data breach | TechCrunch

Marquis attributes an August 2025 ransomware attack to credential exposure from its firewall provider SonicWall's cloud backup breach and plans to seek compensation.
#healthcare-data-breach
#ramp
Information security
fromArs Technica
4 weeks ago

Site catering to online criminals has been seized by the FBI

The FBI seized RAMP, a major Russian-language ransomware marketplace with over 14,000 vetted users, disrupting a significant cybercrime forum and its operations.
Information security
fromDataBreaches.Net
1 month ago

France's Waltio faces ransom threat from notorious hacker collective - DataBreaches.Net

Waltio faces a ShinyHunters ransom threat claiming nearly 50,000 users' data and threatening to leak 2024 tax reports, while core systems remain secure.
Canada news
fromwww.cbc.ca
4 weeks ago

More criminals are using AI for ransomware attacks, cybersecurity centre warns | CBC News

Ransomware attacks in Canada are increasing and evolving rapidly, with criminals using AI to identify vulnerabilities, create malware, and automate extortion.
fromComputerWeekly.com
4 weeks ago

Broken decryptor leaves Sicarii ransomware victims adrift | Computer Weekly

A coding error, possibly introduced thanks to over-reliance on artificial intelligence (AI) vibe coding tools, has rendered an emergent strain of ransomware an acutely dangerous threat, according to researchers at Halcyon's Ransomware Research Center (RRC). The Sicarii ransomware-as-a-service (RaaS) operation emerged from the cyber criminal underground in December 2025, when it started advertising for affiliates on the dark web.
Information security
Information security
fromThe Hacker News
1 month ago

Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware

Multi-stage phishing campaign targets Russian users, using social-engineered documents, cloud-hosted loaders, Defender-disable tricks, and deployments of Amnesia RAT and ransomware.
Information security
fromSecurityWeek
1 month ago

Nike Probing Potential Security Incident as Hackers Threaten to Leak Data

Nike is investigating a potential cybersecurity incident after WorldLeaks listed Nike as a victim and threatened to publish alleged stolen data unless paid.
Information security
fromChannelPro
1 month ago

Ransomware is on the rise. Again

Ransomware is resurging with smarter, AI-augmented attacks that leverage phishing, credential theft, and identity/access exploitation, pressuring defenders and creating MSP opportunities.
Information security
fromTechzine Global
1 month ago

New Windows backdoor emerges in ransomware attack

PDFSider is a stealthy Windows backdoor deployed via social engineering and DLL side-loading to provide persistent, encrypted access and data exfiltration over DNS.
#cybercrime
fromFortune
1 month ago
Information security

Feds are hunting teenage hacking groups like 'Scattered Spider' who have targeted $1 trillion worth of the Fortune 500 since 2022 | Fortune

fromFortune
1 month ago
Information security

Feds are hunting teenage hacking groups like 'Scattered Spider' who have targeted $1 trillion worth of the Fortune 500 since 2022 | Fortune

#black-basta
fromDataBreaches.Net
1 month ago

HHS OCR comments on its 2026 priorities - DataBreaches.Net

OCR continues to execute its enforcement mission under its statutory and regulatory authorities regarding civil rights, exercise of conscience, and health information privacy and security, and breach notification. OCR continues to investigate complaints filed, to conduct compliance reviews, and to review breaches of unsecured protected health information. OCR will be responsive to the HIPAA trends and compliance issues within OCR's jurisdiction that are affecting the public and the regulated industry.
Privacy professionals
Information security
fromTheregister
1 month ago

DeadLock ransomware uses smart contracts to evade defenders

DeadLock ransomware uses Polygon smart contracts and decentralized messaging wrappers to rotate proxy URLs and evade detection while relying on encryption-only extortion.
Public health
fromDataBreaches.Net
1 month ago

University of Hawaii Cancer Center: Hackers Stole Research Files, Encrypted Data - DataBreaches.Net

Ransomware attackers stole data from University of Hawaii Cancer Center studies from the 1990s, and the center paid a ransom for a decryptor key.
fromComputerWeekly.com
1 month ago

Business leaders see AI risks and fraud outpacing ransomware, says WEF | Computer Weekly

Midway through a decade that is coming to be defined by the runaway acceleration of technological change, the threat of ransomware attacks seems to be dropping down the agenda in boardrooms around the world, with C-suite executives more concerned about growing risks arising from artificial intelligence (AI) vulnerabilities, cyber-enabled fraud and phishing attacks, disruption to supply chains, and exploitation of software vulnerabilities.
Information security
Information security
fromDataBreaches.Net
1 month ago

CrazyHunter ransomware escalates with advanced intrusion tactics, six Taiwan healthcare victims confirmed - DataBreaches.Net

CrazyHunter ransomware, a Go-based Prince fork, has rapidly evolved with advanced intrusion and evasion capabilities, targeting Taiwanese healthcare providers and leaking stolen data.
France news
fromDataBreaches.Net
1 month ago

Basketball player arrested for alleged ransomware ties freed in Russia-France prisoner swap - DataBreaches.Net

Daniil Kasatkin, a Russian basketball player accused of negotiating for a ransomware gang, was freed in a prisoner exchange between Russia and France.
World news
fromTheregister
1 month ago

France swaps alleged ransomware crook for conflict researche

France exchanged an alleged US-wanted ransomware suspect for pardoned French researcher Laurent Vinatier, who was released from a Russian prison.
Information security
fromThe Hacker News
1 month ago

Cybersecurity Predictions 2026: The Hype We Can Ignore (And the Risks We Can't)

Organizations must prioritize evidence-based cybersecurity predictions focusing on targeted ransomware, internal AI-related risks, and skepticism about AI-orchestrated attacks.
fromTheregister
1 month ago

Ransomware attacks kept climbing in 2025

Trackers keeping an eye on ransomware leak sites logged more than 8,000 claimed victims worldwide in 2025, a rise of more than 50 percent compared to 2023. The counts come from outfits watching dark web shaming pages such as Ransomware.live and RansomLook.io, so they only include cases where crooks decided to post receipts. Plenty of victims, Emsisoft says, will have paid up, recovered, or kept quiet without ever appearing on a leak site.
Information security
#healthcare
#lockbit
Information security
fromComputerworld
1 month ago

US cybersecurity experts plead guilty to attacking US companies with ransomware

Two cybersecurity professionals pleaded guilty to conspiring to use BlackCat ransomware to extort multiple U.S. victims and will be sentenced March 12, 2026.
#alphv-blackcat
fromDataBreaches.Net
1 month ago
US news

Two Cybersecurity Professionals Plead Guilty to Targeting Multiple U.S. Victims Using ALPHV BlackCat Ransomware - DataBreaches.Net

fromDataBreaches.Net
1 month ago
US news

Two Cybersecurity Professionals Plead Guilty to Targeting Multiple U.S. Victims Using ALPHV BlackCat Ransomware - DataBreaches.Net

Information security
fromTechzine Global
1 month ago

Security experts themselves carried out ransomware attacks

Two U.S. cybersecurity employees pleaded guilty to using BlackCat/ALPHV ransomware to extort victims, launder proceeds, and face up to 20 years in prison.
Information security
fromSocial Media Explorer
1 month ago

Is Your Bank Prepared for the Next Big Cybersecurity Threat? - Social Media Explorer

Preparedness through managed IT services and proactive security is essential for banks to counter evolving cyber threats like ransomware and spear-phishing.
Information security
fromThe Verge
1 month ago

Two cybersecurity employees plead guilty to carrying out ransomware attacks

Two former cybersecurity employees pleaded guilty to using ALPHV/BlackCat ransomware to extort $1.2 million and target multiple U.S. companies in 2023.
Information security
fromAxios
2 months ago

Why hackers love the holidays

Attackers exploit reduced holiday security staffing to carry out phishing, ransomware, and data theft, so organizations must harden defenses before holidays.
World news
fromThe Hacker News
2 months ago

INTERPOL Arrests 574 in Africa; Ukrainian Ransomware Affiliate Pleads Guilty

Operation Sentinel recovered $3 million, arrested 574 suspects across 19 African countries, removed over 6,000 malicious links, and decrypted six ransomware variants.
Miscellaneous
fromTheregister
2 months ago

1,000 systems pwned in Romanian Waters ransomware attack

A ransomware attack encrypted files on about 1,000 systems across Romania's water management administration, affecting multiple servers while hydrotechnical operations continue locally.
fromTheregister
2 months ago

FBI dismantles alleged $70M crypto laundering operation

US feds have dismantled a crypto laundering service that they say helped cybercrooks wash tens of millions of dollars in dirty digital cash, seizing its servers and unsealing charges against an alleged Russian operator. The FBI, working with cops in Europe and a grab bag of state and federal agencies, announced this week that it has taken down the infrastructure behind E-Note, an unlicensed virtual currency exchange accused of acting as a financial rinse cycle for ransomware crews, account takeover gangs, and other online criminals.
US news
Information security
fromTheregister
2 months ago

React2Shell: Microsoft counts hundreds of hacked machines

Attackers exploited React2Shell (CVE-2025-55182) to compromise several hundred servers, execute arbitrary code, deploy malware, and in some cases deliver ransomware.
Information security
fromComputerWeekly.com
2 months ago

ClickFix attacks that bypass cyber controls on the rise | Computer Weekly

ClickFix attacks surged in 2025, tricking users into running commands that bypass conventional defenses and enable RATs, credential theft, and ransomware.
fromZDNET
2 months ago

Still running Windows 10? Here's why that's a bad idea

Hundreds of millions of computers worldwide are still running Windows 10, months after the one-time king of PC operating systems officially passed its end-of-support deadline. If you're responsible for one of those machines and you aren't ready to upgrade to Windows 11, you can sign up today for an Extended Security Updates (ESU) subscription -- consumers can get those updates free through October 2026, as I explain here: How to get free Windows 10 security patches on your PC - from now to October 2026.
Information security
[ Load more ]