Home Search
ransomware - search results
If you're not happy with the results, please do another search
Cerber Linux Ransomware Exploits Atlassian Servers to Take Full Control
Security researchers at Cado Security Labs have uncovered a new variant of the Cerber ransomware targeting Linux systems.This strain of the notorious malware...
L00KUPRU Ransomware Attackers discovered in the wild
A new variant of the Xorist ransomware, dubbed L00KUPRU, has been discovered in the wild, posing a threat to unsuspecting users.The L00KUPRU ransomware is...
Hacker Customize LockBit 3.0 Ransomware to Attack Orgs Worldwide
Cybersecurity researchers at Kaspersky have uncovered evidence that cybercriminal groups are customizing the virulent LockBit 3.0 ransomware for targeted attacks against organizations worldwide.This...
GHC-SCW Hack: Ransomware Actors Stolen User’s Personal Information
Group Health Cooperative of South Central Wisconsin (GHC-SCW) has announced a significant breach in their cybersecurity, leading to unauthorized access and theft of personal...
Ransomware Attack Via Unpatched Vulnerabilities Are Brutal: New Survey
Adversaries use stolen credentials or exploit software vulnerabilities to gain access for ransomware attacks, which impacts the initial infection method.The study surveyed IT professionals...
Ransomware Protection for SaaS Applications: How Backup Strategies Can Mitigate Cyber Risks
Because of today's predominantly digital ecosystem, ransomware attacks pose a significant threat to organizations. These attacks can significantly affect those leveraging Software as a...
Hosting Provider VMware ESXi Servers Hit by New SEXi Ransomware
A new ransomware variant is targeting VMware ESXi servers, a popular virtualization platform used by hosting providers worldwide.Dubbed "SEXi" by its creators, this ransomware...
Jackson County Missouri Ransomware Attack Impacts IT Systems
Jackson County, Missouri, has become the latest victim of a ransomware attack, which has caused substantial disruptions within its Information Technology (IT) systems.This attack...
Live Forensic Techniques To Detect Ransomware Infection On Linux Machines
Ransomware, initially a Windows threat, now targets Linux systems, endangering IoT ecosystems.Linux ransomware employs diverse encryption methods, evading traditional forensics. Still developing, it shows...
Beware of New ‘HelloFire’ Ransomware Actor Mimic as a Pentester
A new threat is the emergence of a ransomware encryptor dubbed 'HelloFire.'This new player in the cybercrime arena is employing deceptive tactics to disguise...