#ransomware

[ follow ]
Information security
fromTheregister
5 hours ago

Nitrogen can't unlock its own ransomware after coding error

Nitrogen's VMware ESXi ransomware corrupts the public key via a stack overlap, making decryption impossible even if victims pay.
Information security
fromComputerWeekly.com
22 hours ago

Ransomware gangs focus on winning hearts and minds | Computer Weekly

Ransomware gangs are professionalizing, scaling affiliate models, recruiting insiders and cyber professionals, and offering larger commissions and better OpSec to enable more successful attacks.
#cisa
fromTheregister
1 day ago
Information security

CISA quietly updated ransomware flags on 59 flaws last year

On 59 occasions in 2025 CISA changed KEV entries to indicate ransomware use without alerting defenders, creating unnoticed risk shifts and missed remediation priorities.
fromDataBreaches.Net
1 month ago
US politics

CISA loses key employee behind early ransomware warnings - DataBreaches.Net

CISA's Pre-Ransomware Notification Initiative lost its lead staffer, David Stern, after he resigned rather than accept reassignment to FEMA.
#data-breach
fromdatabreaches.net
2 days ago
Information security

Ransomware attack compromised 377,000 people's Social Security and driver's license numbers from Texas gas station and convenience store chain

fromdatabreaches.net
2 days ago
Information security

Ransomware attack compromised 377,000 people's Social Security and driver's license numbers from Texas gas station and convenience store chain

Information security
fromSecurityWeek
2 days ago

Over 1,400 MongoDB Databases Ransacked by Threat Actor

1,416 of 3,100 internet-exposed MongoDB databases were compromised and replaced with ransom notes demanding about $500 in Bitcoin per incident.
Information security
fromTechCrunch
5 days ago

Fintech firm Marquis blames hack at firewall provider SonicWall for its data breach | TechCrunch

Marquis attributes an August 2025 ransomware attack to credential exposure from its firewall provider SonicWall's cloud backup breach and plans to seek compensation.
#healthcare-data-breach
#ramp
Information security
fromArs Technica
6 days ago

Site catering to online criminals has been seized by the FBI

The FBI seized RAMP, a major Russian-language ransomware marketplace with over 14,000 vetted users, disrupting a significant cybercrime forum and its operations.
Information security
fromDataBreaches.Net
1 week ago

France's Waltio faces ransom threat from notorious hacker collective - DataBreaches.Net

Waltio faces a ShinyHunters ransom threat claiming nearly 50,000 users' data and threatening to leak 2024 tax reports, while core systems remain secure.
Canada news
fromwww.cbc.ca
1 week ago

More criminals are using AI for ransomware attacks, cybersecurity centre warns | CBC News

Ransomware attacks in Canada are increasing and evolving rapidly, with criminals using AI to identify vulnerabilities, create malware, and automate extortion.
fromComputerWeekly.com
1 week ago

Broken decryptor leaves Sicarii ransomware victims adrift | Computer Weekly

A coding error, possibly introduced thanks to over-reliance on artificial intelligence (AI) vibe coding tools, has rendered an emergent strain of ransomware an acutely dangerous threat, according to researchers at Halcyon's Ransomware Research Center (RRC). The Sicarii ransomware-as-a-service (RaaS) operation emerged from the cyber criminal underground in December 2025, when it started advertising for affiliates on the dark web.
Information security
Information security
fromThe Hacker News
1 week ago

Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware

Multi-stage phishing campaign targets Russian users, using social-engineered documents, cloud-hosted loaders, Defender-disable tricks, and deployments of Amnesia RAT and ransomware.
Information security
fromSecurityWeek
1 week ago

Nike Probing Potential Security Incident as Hackers Threaten to Leak Data

Nike is investigating a potential cybersecurity incident after WorldLeaks listed Nike as a victim and threatened to publish alleged stolen data unless paid.
Information security
fromChannelPro
2 weeks ago

Ransomware is on the rise. Again

Ransomware is resurging with smarter, AI-augmented attacks that leverage phishing, credential theft, and identity/access exploitation, pressuring defenders and creating MSP opportunities.
#healthcare-cybersecurity
Information security
fromTechzine Global
2 weeks ago

New Windows backdoor emerges in ransomware attack

PDFSider is a stealthy Windows backdoor deployed via social engineering and DLL side-loading to provide persistent, encrypted access and data exfiltration over DNS.
#cybercrime
fromFortune
1 month ago
Information security

Feds are hunting teenage hacking groups like 'Scattered Spider' who have targeted $1 trillion worth of the Fortune 500 since 2022 | Fortune

fromIT Pro
2 months ago
World news

The US, UK, and Australia just imposed sanctions on a Russian cyber crime group - 'we are exposing their dark networks and going after those responsible'

fromFortune
1 month ago
Information security

Feds are hunting teenage hacking groups like 'Scattered Spider' who have targeted $1 trillion worth of the Fortune 500 since 2022 | Fortune

fromIT Pro
2 months ago
World news

The US, UK, and Australia just imposed sanctions on a Russian cyber crime group - 'we are exposing their dark networks and going after those responsible'

#black-basta
fromDataBreaches.Net
2 weeks ago

HHS OCR comments on its 2026 priorities - DataBreaches.Net

OCR continues to execute its enforcement mission under its statutory and regulatory authorities regarding civil rights, exercise of conscience, and health information privacy and security, and breach notification. OCR continues to investigate complaints filed, to conduct compliance reviews, and to review breaches of unsecured protected health information. OCR will be responsive to the HIPAA trends and compliance issues within OCR's jurisdiction that are affecting the public and the regulated industry.
Privacy professionals
Information security
fromTheregister
3 weeks ago

DeadLock ransomware uses smart contracts to evade defenders

DeadLock ransomware uses Polygon smart contracts and decentralized messaging wrappers to rotate proxy URLs and evade detection while relying on encryption-only extortion.
Public health
fromDataBreaches.Net
3 weeks ago

University of Hawaii Cancer Center: Hackers Stole Research Files, Encrypted Data - DataBreaches.Net

Ransomware attackers stole data from University of Hawaii Cancer Center studies from the 1990s, and the center paid a ransom for a decryptor key.
fromComputerWeekly.com
3 weeks ago

Business leaders see AI risks and fraud outpacing ransomware, says WEF | Computer Weekly

Midway through a decade that is coming to be defined by the runaway acceleration of technological change, the threat of ransomware attacks seems to be dropping down the agenda in boardrooms around the world, with C-suite executives more concerned about growing risks arising from artificial intelligence (AI) vulnerabilities, cyber-enabled fraud and phishing attacks, disruption to supply chains, and exploitation of software vulnerabilities.
Information security
Information security
fromDataBreaches.Net
3 weeks ago

CrazyHunter ransomware escalates with advanced intrusion tactics, six Taiwan healthcare victims confirmed - DataBreaches.Net

CrazyHunter ransomware, a Go-based Prince fork, has rapidly evolved with advanced intrusion and evasion capabilities, targeting Taiwanese healthcare providers and leaking stolen data.
France news
fromDataBreaches.Net
3 weeks ago

Basketball player arrested for alleged ransomware ties freed in Russia-France prisoner swap - DataBreaches.Net

Daniil Kasatkin, a Russian basketball player accused of negotiating for a ransomware gang, was freed in a prisoner exchange between Russia and France.
World news
fromTheregister
3 weeks ago

France swaps alleged ransomware crook for conflict researche

France exchanged an alleged US-wanted ransomware suspect for pardoned French researcher Laurent Vinatier, who was released from a Russian prison.
Information security
fromThe Hacker News
3 weeks ago

Cybersecurity Predictions 2026: The Hype We Can Ignore (And the Risks We Can't)

Organizations must prioritize evidence-based cybersecurity predictions focusing on targeted ransomware, internal AI-related risks, and skepticism about AI-orchestrated attacks.
fromTheregister
3 weeks ago

Ransomware attacks kept climbing in 2025

Trackers keeping an eye on ransomware leak sites logged more than 8,000 claimed victims worldwide in 2025, a rise of more than 50 percent compared to 2023. The counts come from outfits watching dark web shaming pages such as Ransomware.live and RansomLook.io, so they only include cases where crooks decided to post receipts. Plenty of victims, Emsisoft says, will have paid up, recovered, or kept quiet without ever appearing on a leak site.
Information security
#healthcare
#cybersecurity
fromNature
2 months ago
Information security

Cyberattacks' harm to universities is growing - and so are their effects on research

fromNature
2 months ago
Information security

Cyberattacks' harm to universities is growing - and so are their effects on research

#lockbit
Information security
fromComputerworld
1 month ago

US cybersecurity experts plead guilty to attacking US companies with ransomware

Two cybersecurity professionals pleaded guilty to conspiring to use BlackCat ransomware to extort multiple U.S. victims and will be sentenced March 12, 2026.
#alphv-blackcat
fromDataBreaches.Net
1 month ago
US news

Two Cybersecurity Professionals Plead Guilty to Targeting Multiple U.S. Victims Using ALPHV BlackCat Ransomware - DataBreaches.Net

fromDataBreaches.Net
1 month ago
US news

Two Cybersecurity Professionals Plead Guilty to Targeting Multiple U.S. Victims Using ALPHV BlackCat Ransomware - DataBreaches.Net

Information security
fromTechzine Global
1 month ago

Security experts themselves carried out ransomware attacks

Two U.S. cybersecurity employees pleaded guilty to using BlackCat/ALPHV ransomware to extort victims, launder proceeds, and face up to 20 years in prison.
Information security
fromSocial Media Explorer
1 month ago

Is Your Bank Prepared for the Next Big Cybersecurity Threat? - Social Media Explorer

Preparedness through managed IT services and proactive security is essential for banks to counter evolving cyber threats like ransomware and spear-phishing.
Information security
fromThe Verge
1 month ago

Two cybersecurity employees plead guilty to carrying out ransomware attacks

Two former cybersecurity employees pleaded guilty to using ALPHV/BlackCat ransomware to extort $1.2 million and target multiple U.S. companies in 2023.
Information security
fromAxios
1 month ago

Why hackers love the holidays

Attackers exploit reduced holiday security staffing to carry out phishing, ransomware, and data theft, so organizations must harden defenses before holidays.
World news
fromThe Hacker News
1 month ago

INTERPOL Arrests 574 in Africa; Ukrainian Ransomware Affiliate Pleads Guilty

Operation Sentinel recovered $3 million, arrested 574 suspects across 19 African countries, removed over 6,000 malicious links, and decrypted six ransomware variants.
Miscellaneous
fromTheregister
1 month ago

1,000 systems pwned in Romanian Waters ransomware attack

A ransomware attack encrypted files on about 1,000 systems across Romania's water management administration, affecting multiple servers while hydrotechnical operations continue locally.
#cyberattack
fromIT Pro
2 months ago
Information security

Impact of Asahi cyber attack laid bare as company confirms 1.5 million customers exposed

fromIT Pro
2 months ago
Information security

Impact of Asahi cyber attack laid bare as company confirms 1.5 million customers exposed

fromTheregister
1 month ago

FBI dismantles alleged $70M crypto laundering operation

US feds have dismantled a crypto laundering service that they say helped cybercrooks wash tens of millions of dollars in dirty digital cash, seizing its servers and unsealing charges against an alleged Russian operator. The FBI, working with cops in Europe and a grab bag of state and federal agencies, announced this week that it has taken down the infrastructure behind E-Note, an unlicensed virtual currency exchange accused of acting as a financial rinse cycle for ransomware crews, account takeover gangs, and other online criminals.
US news
Information security
fromTheregister
1 month ago

React2Shell: Microsoft counts hundreds of hacked machines

Attackers exploited React2Shell (CVE-2025-55182) to compromise several hundred servers, execute arbitrary code, deploy malware, and in some cases deliver ransomware.
Information security
fromComputerWeekly.com
1 month ago

ClickFix attacks that bypass cyber controls on the rise | Computer Weekly

ClickFix attacks surged in 2025, tricking users into running commands that bypass conventional defenses and enable RATs, credential theft, and ransomware.
fromZDNET
1 month ago

Still running Windows 10? Here's why that's a bad idea

Hundreds of millions of computers worldwide are still running Windows 10, months after the one-time king of PC operating systems officially passed its end-of-support deadline. If you're responsible for one of those machines and you aren't ready to upgrade to Windows 11, you can sign up today for an Extended Security Updates (ESU) subscription -- consumers can get those updates free through October 2026, as I explain here: How to get free Windows 10 security patches on your PC - from now to October 2026.
Information security
Information security
fromAbove the Law
1 month ago

Incident Response Has Become A Law Firm Survival Skill - Above the Law

Law firms face targeted cyberattacks; preparedness and practiced incident response, clear leadership, and fast decisions prevent compounded damage and regulatory, ethical, and malpractice risks.
#hypervisor-security
fromTechzine Global
1 month ago
Information security

Ransomware increasingly targeting hypervisors

Attackers increasingly target hypervisors (VMware ESXi, Microsoft Hyper-V) to compromise entire virtual environments, enabling large-scale ransomware impact by controlling the virtualization layer.
fromTheregister
1 month ago
DevOps

Researchers spot 700 percent increase in hypervisor attacks

Ransomware attacks on hypervisors surged, with Akira driving a rise from 3% to 25%, exploiting weak defenses to encrypt virtual machines.
Information security
fromThe Hacker News
1 month ago

STAC6565 Targets Canada in 80% of Attacks as Gold Blade Deploys QWCrypt Ransomware

STAC6565 (Gold Blade/RedCurl) targeted Canadian organizations, combining data theft and selective ransomware operations using custom tools such as QWCrypt and RedLoader.
fromTheregister
2 months ago

Asus supplier hacked by Everest gang, loses 1 TB of data

In a post on its dark web leak site, seen by The Register, Everest said: "Files contain this information and much more: Binary segmentation modules, Source code & patches, RAM dumps & memory logs, AI models & weights, OEM internal tools & firmware, Test videos, Calibration & dual-camera data, Image datasets, Crash logs & debug reports, Evaluation & performance reports, HDR, fusion, post processing data, Test APKs, experimental apps, Scripts & automation, Small config binary calibration files."
Information security
Information security
fromIT Pro
2 months ago

The most prominent infostealers and how businesses can protect against them

Infostealers increasingly harvest credentials that enable major breaches and ransomware, with strains like Stealerium and Lumma driving widespread, adaptable, multi-vector attacks.
fromTechzine Global
2 months ago

Manufacturing sees less data encryption in cyberattacks, but still pays

Encryption rates in ransomware attacks on manufacturing companies have fallen sharply. Only 40 percent of attacks resulted in actual encryption, the lowest level in five years and a significant drop from 74 percent last year. However, attackers are compensating for this with a different tactic: extortion without encryption rose from 3 percent in 2024 to 10 percent in 2025. They are increasingly relying on stolen data as a means of pressure.
Information security
Miscellaneous
fromBitcoin Magazine
2 months ago

Europol, Swiss Police Shatter $1.5B Bitcoin 'Cryptomixer'

Swiss and German law enforcement shut down Cryptomixer.io, seizing servers, the domain, over EUR 25 million in bitcoin and more than 12 terabytes of data.
Information security
fromComputerworld
2 months ago

Why security needs a step change to thwart cyber attacks amid surging innovation

Enterprises must implement comprehensive vulnerability management—including automated scanning, prompt patching, and scalable penetration testing—to prevent preventable breaches and reduce attack surfaces from AI adoption.
London
fromwww.theguardian.com
2 months ago

Londoners told to be vigilant with messages after cyber-attack on council

RBKC confirmed data were copied in a cyber-attack and urged residents to be extra vigilant for suspicious calls, emails or texts while investigations continue.
Information security
fromTheregister
2 months ago

Get ready for 2026, the year of AI-aided ransomware

Cybercriminals will increasingly adopt agentic AI to automate attacks, following state-sponsored pioneers, enabling more autonomous, scalable, low-effort cyber operations.
Information security
fromTelecompetitor
2 months ago

Ransomware Spikes During Holidays and Weekends: Report

Ransomware attacks most often occur on weekends and holidays and increase after mergers and acquisitions due to reduced staffing and weakened governance.
fromIT Pro
2 months ago

Simulating attacks: how to use tabletop exercises in incident response

Among the benefits, tabletop exercises simulate a real-life attack so firms can put incident response plans to the test, including decision-making processes, communications and technical measures. When done well, tabletop exercises can expose blind spots and help response teams "build the muscle memory needed to act fast when the real thing hits", says Adam Harrison, managing director in the cyber security practice at FTI Consulting. So what types of tabletop exercises are available and how can you use them in your business?
Information security
World news
fromComputerWeekly.com
2 months ago

Russian money launderers bought a bank to disguise ransomware profit | Computer Weekly

A UK-linked billion-dollar money-laundering network bought a Kyrgyz bank to convert criminal proceeds into cryptocurrency and evade sanctions supporting Russia's war in Ukraine.
fromTheregister
2 months ago

US, UK, Australia sanction Lockbit gang's hosting provider

Cybercrime fighters in the US, UK, and Australia have imposed sanctions on several Russia-linked entities they claim provide hosting services to ransomware gangs Lockbit, BlackSuit, and Play. The sanctions target an organization called "Media Land," an entity that the US Department of Treasury describes as a provider of hosting services to "criminal marketplaces and ransomware actors" and which allowed its infrastructure to be used for "multiple distributed denial-of-service (DDOS) attacks against U.S. victim companies and critical infrastructure."
Information security
fromFast Company
2 months ago

Why replication can't fix the ransomware problem

Ransomware doesn't knock on the front door. It sneaks in quietly, and by the time you notice, the damage is already done. Backups, replication, and cloud storage help recover from ransomware, but when it strikes, these products may not be enough. You copy your data and ensure copies are recoverable when needed. Replication is often viewed as the gold standard of protection. It is fast, efficient, and seems like an easy answer. Two common types of replication are in use today.
Information security
Information security
fromThe Hacker News
2 months ago

Ransomware's Fragmentation Reaches a Breaking Point While LockBit Returns

Ransomware fragmented in Q3 2025 with 85 active groups, 1,592 victims, 14 new brands, and LockBit’s return suggesting possible re-centralization.
fromTheregister
2 months ago

NHS supplier ends 18-month probe into cyberattack

In a statement published this week, Synnovis said the investigation "took more than a year to complete because the compromised data was unstructured, incomplete and fragmented, and often very difficult to understand." It added that specialist incident response teams had to use "highly specialized platforms and bespoke processes" to work through terabytes of jumbled information and identify which healthcare providers' patients were affected.
Healthcare
#cyber-insurance
Information security
fromThe Hacker News
2 months ago

GootLoader Is Back, Using a New Font Trick to Hide Malware on WordPress Sites

GootLoader has resurfaced, using custom WOFF2 glyph substitution and WordPress comment endpoints to deliver XOR-encrypted ZIP payloads, enabling rapid domain controller compromise and ransomware hand-offs.
Information security
fromTheregister
2 months ago

Russian broker pleads guilty to assisting US cyberattacks

Aleksei Volkov, a 25-year-old Russian initial access broker tied to Yanluowang, pleaded guilty and faces years in US prison for facilitating multiple ransomware attacks.
[ Load more ]