Thursday, December 7, 2023
Home Search

ransomware - search results

If you're not happy with the results, please do another search

Akira Ransomware Exploiting Zero-day Flaws For Organization Network Access

The Akira ransomware group, which first appeared in March 2023, has been identified as a serious threat to data security. It encrypts data and...
Cactus Ransomware Qlik

Cactus Ransomware Exploiting Qlik Sense code execution Vulnerability

A new Cactus Ransomware was exploited in the code execution vulnerability to Qlik Sense for initial access.Qlik Sense is a data discovery and analytics...
Hackers High-Profile Ransomware

Hackers Behind High-Profile Ransomware Attacks on 71 Countries Arrested

Hackers launched ransomware attacks to extort money from the following two entities by encrypting their data and demanding a ransom payment for its release:-IndividualsOrganizations  Here,...

Yamaha Ransomware Attack: Employees Personal Information Exposed

A ransomware attack targeted Yamaha Motor Co., Ltd., resulting in a partial disclosure of the personal information maintained by the company.Notably, a third party...
Ransomware Gang SEC Complaint

Ransomware Gang Files an SEC Complaint for Victim Not Disclosing Data Breach

Alphv Ransomware gang filed an SEC complaint against MeridianLink for not disclosing a data breach.BlackCat, also known as ALPHV, BlackCat operates on the ransomware...

Toyota Financial Hack Claimed by Medusa Ransomware

The biggest manufacturer of automobiles, Toyota, has discovered unauthorized activity on systems in a few of its Europe & African services.The 'Medusa ransomware gang...

SystemBC, a SWISS KNIFE Proxy Malware, Used by Numerous Ransomware Groups

SystemBC (aka Coroxy or DroxiDat) is a multifunctional malware known as Proxy, Bot, Backdoor, and RAT, adapting to attackers' needs. Since 2018, this multifunctional malware...

SysAid IT Service Software 0-day Exploited to Deploy Cl0p Ransomware

SysAid On-Prem software has been reported with a 0-day vulnerability determined during an incident response investigation.According to Microsoft, attackers are exploiting this zero-day vulnerability...

Hackers Exploiting Confluence Flaw to Deploy Ransomware

Hackers actively target Confluence flaws because it is a widely used collaboration and documentation platform, making it a valuable target for gaining unauthorized access...

Ransomware Actors Exploiting Legitimate System Tools to Gain Access – FBI

Ransomware attacks are on the rise, causing organizations to lose millions of dollars, restricting them from accessing their data, and possibly disclosing personal information.According to...

Managed WAF protection


Recent Articles