The FBI and the US Cybersecurity and Infrastructure Security Agency (CISA) have released details on the tactics and techniques threat actors are using to...
Move over MOVEit, there's a new zero-day being exploited to deploy Clop ransomware into enterprise networks. This time, the same threat actors were caught...
Operating since last May, an emerging ransomware strain called Rhysida was deployed along with new stealer malware called Lumar for a potent new one-two...
Researchers have identified a new strain of ransomware that dates back to 2019 and targets individuals and small businesses, demanding small ransoms from each...
Dallas city government systems are still not fully functioning following a cyberattack by the Royal ransomware group.The City of Dallas confirmed the ransomware attack,...
Organizations using older versions of VMWare ESXi hypervisors are learning a hard lesson about staying up-to-date with vulnerability patching, as a global ransomware attack on...
FBI infiltrates a ransomware gang to help 300 victims and thwarts extortion of over $130 million. Hive Network targeted hospitals, schools, and banking...
In another sign that the tide may be finally turning against ransomware actors, ransom payments declined substantially in 2022 as more victims refused to...
The operators of a ransomware strain called Play have developed a new exploit chain for a critical remote code execution (RCE) vulnerability in Exchange...
Cruddy cryptography means victims whose files have been encrypted by the Ukraine-tormenting ransomware can break the chains without paying extortionists. A...
Threat actors have focused on two ends of the spectrum — quick, impactful attacks or stealthy intrusions — making strong prevention and faster response more important for enterprises.