ransomware

New Phishing Framework Attack Multiple Brands Login Pages To Steal CredentialsNew Phishing Framework Attack Multiple Brands Login Pages To Steal Credentials

New Phishing Framework Attack Multiple Brands Login Pages To Steal Credentials

Researchers have identified a sophisticated phishing tactic leveraging Cloudflare's workers.dev, a free domain name service, to execute credential theft campaigns.…

2 months ago
LockBit Ransomware: 11-Day Timeline from Initial Compromise to DeploymentLockBit Ransomware: 11-Day Timeline from Initial Compromise to Deployment

LockBit Ransomware: 11-Day Timeline from Initial Compromise to Deployment

A well-coordinated cyber intrusion, spanning 11 days, culminated in the deployment of LockBit ransomware across a corporate environment. The attack,…

2 months ago
HellCat and Morpheus Ransomware Share Identical Payloads for AttacksHellCat and Morpheus Ransomware Share Identical Payloads for Attacks

HellCat and Morpheus Ransomware Share Identical Payloads for Attacks

The cybersecurity landscape witnessed a surge in ransomware activity during the latter half of 2024 and into early 2025, with…

2 months ago
North Korean IT Workers Steal Companies Source Codes to Demand RansomwareNorth Korean IT Workers Steal Companies Source Codes to Demand Ransomware

North Korean IT Workers Steal Companies Source Codes to Demand Ransomware

The Federal Bureau of Investigation (FBI) has issued fresh warnings about malicious activities by North Korean IT workers targeting U.S.-based…

2 months ago
Hackers Deliver Ransomware on Windows Via Microsoft Teams Voice CallsHackers Deliver Ransomware on Windows Via Microsoft Teams Voice Calls

Hackers Deliver Ransomware on Windows Via Microsoft Teams Voice Calls

Sophos X-Ops’ Managed Detection and Response (MDR) team has uncovered two highly active threat actor clusters exploiting Microsoft Office 365…

2 months ago
New Contacto Ransomware Evades AV Detection & Uses Windows Console for ExecutionNew Contacto Ransomware Evades AV Detection & Uses Windows Console for Execution

New Contacto Ransomware Evades AV Detection & Uses Windows Console for Execution

In early January 2025, a new ransomware strain identified as Contacto surfaced, showcasing advanced techniques designed to bypass conventional security…

2 months ago
Ransomware Attack Forces UK Brit High School to Close Doors For StudentsRansomware Attack Forces UK Brit High School to Close Doors For Students

Ransomware Attack Forces UK Brit High School to Close Doors For Students

A ransomware attack has compelled UK Brit, a prominent British high school, to close its doors to students for two…

2 months ago
FunkSec Ransomware Dominating Ransomware Attacks, Compromised 85 Victims In DecemberFunkSec Ransomware Dominating Ransomware Attacks, Compromised 85 Victims In December

FunkSec Ransomware Dominating Ransomware Attacks, Compromised 85 Victims In December

FunkSec is a RaaS operator that makes use of artificial intelligence and demonstrates how threat actor strategies are constantly evolving.…

2 months ago
New NonEuclid RAT Evades Antivirus and Encrypts Critical FilesNew NonEuclid RAT Evades Antivirus and Encrypts Critical Files

New NonEuclid RAT Evades Antivirus and Encrypts Critical Files

A NonEuclid sophisticated C# Remote Access Trojan (RAT) designed for the.NET Framework 4.8 has been shown to pose a significant…

3 months ago
New Great Morpheus Hacker Group Claims Hacking Into Arrotex Pharmaceuticals And PUS GmbHNew Great Morpheus Hacker Group Claims Hacking Into Arrotex Pharmaceuticals And PUS GmbH

New Great Morpheus Hacker Group Claims Hacking Into Arrotex Pharmaceuticals And PUS GmbH

A Data Leak Site (DLS) belonging to a new extortion group named Morpheus, which has stolen data from Arrotex Pharmaceuticals…

3 months ago