Ransomware

Cybercriminals turn to pen testers to test ransomware efficiency

Cybercriminals turn to pen testers to test ransomware efficiency 2024-11-22 at 07:04 By Help Net Security Ransomware gangs recruit pen testers to improve attack reliability Threat actors employ pen testers to improve ransomware effectiveness Threat actors are recruiting pen testers to test and improve the reliability of their ransomware for affiliate programs, according to Cato […]

React to this headline:

Loading spinner

Cybercriminals turn to pen testers to test ransomware efficiency Read More »

Phobos ransomware administrator faces US cybercrime charges

Phobos ransomware administrator faces US cybercrime charges 2024-11-19 at 12:33 By Help Net Security The Justice Department unsealed criminal charges against Evgenii Ptitsyn, 42, a Russian national, for allegedly administering the sale, distribution, and operation of Phobos ransomware. Ptitsyn made his initial appearance in the US District Court for the District of Maryland on Nov.

React to this headline:

Loading spinner

Phobos ransomware administrator faces US cybercrime charges Read More »

Infostealers increasingly impact global security

Infostealers increasingly impact global security 2024-11-13 at 15:18 By Help Net Security Check Point Software’s latest threat index reveals a significant rise in infostealers like Lumma Stealer, while mobile malware like Necro continues to pose a significant threat, highlighting the evolving tactics used by cybercriminals across the globe. Last month researchers discovered an infection chain

React to this headline:

Loading spinner

Infostealers increasingly impact global security Read More »

GoZone ransomware accuses and threatens victims

GoZone ransomware accuses and threatens victims 2024-11-06 at 13:06 By Zeljka Zorz A new ransomware dubbed GoZone is being leveraged by attackers that don’t seem to be very greedy: they are asking the victims to pay just $1,000 in Bitcoin if they want their files decrypted. The GoZone HTML ransom note (Source: SonicWall) The ransom

React to this headline:

Loading spinner

GoZone ransomware accuses and threatens victims Read More »

North Korean hackers pave the way for Play ransomware

North Korean hackers pave the way for Play ransomware 2024-10-31 at 12:49 By Zeljka Zorz North Korean state-sponsored hackers – Jumpy Pisces, aka Andariel, aka Onyx Sleet – have been spotted burrowing into enterprise systems, then seemingly handing matters over to the Play ransomware group. Timeline of the attack (Source: Palo Alto Networks) The attack

React to this headline:

Loading spinner

North Korean hackers pave the way for Play ransomware Read More »

Ransomware hits web hosting servers via vulnerable CyberPanel instances

Ransomware hits web hosting servers via vulnerable CyberPanel instances 2024-10-30 at 16:19 By Zeljka Zorz A threat actor – or possibly several – has hit approximately 22,000 vulnerable instances of CyberPanel and encrypted files on the servers running it with the PSAUX and other ransomware. The PSAUX ransom note (Source: LeakIX) The CyberPanel vulnerabilities CyberPanel

React to this headline:

Loading spinner

Ransomware hits web hosting servers via vulnerable CyberPanel instances Read More »

6 key elements for building a healthcare cybersecurity response plan

6 key elements for building a healthcare cybersecurity response plan 2024-10-30 at 06:33 By Help Net Security Medical practices remain vulnerable to cyberattacks, with over a third unable to cite a cybersecurity incident response plan, according to Software Advice. This gap exposes healthcare providers to risks of patient data breaches, HIPAA violations, financial penalties, and

React to this headline:

Loading spinner

6 key elements for building a healthcare cybersecurity response plan Read More »

Ransomware Vulnerability Matrix: A Comprehensive Resource for Cybersecurity Analysts 

Ransomware Vulnerability Matrix: A Comprehensive Resource for Cybersecurity Analysts  2024-10-29 at 16:18 By daksh sharma Overview  The Ransomware Vulnerability Matrix, a vital repository on GitHub, represents a new step forward in understanding ransomware vulnerabilities. This invaluable repository catalogs known Common Vulnerabilities and Exposures (CVEs) that ransomware groups exploit, providing insights into ransomware types, vulnerable technologies,

React to this headline:

Loading spinner

Ransomware Vulnerability Matrix: A Comprehensive Resource for Cybersecurity Analysts  Read More »

Black Basta operators phish employees via Microsoft Teams

Black Basta operators phish employees via Microsoft Teams 2024-10-28 at 18:51 By Zeljka Zorz Black Basta ransomware affiliates are still trying to trick enterprise employees into installing remote access tool by posing as help desk workers, now also via Microsoft Teams. Phishing via MS Teams Earlier this year, Rapid7 warned about Black Basta using the

React to this headline:

Loading spinner

Black Basta operators phish employees via Microsoft Teams Read More »

The future of cyber insurance: Meeting the demand for non-attack coverage

The future of cyber insurance: Meeting the demand for non-attack coverage 2024-10-25 at 07:35 By Mirko Zorz In this Help Net Security interview, Michael Daum, Head of Global Cyber Claims for Allianz Commercial, discusses the significant rise in cyber claims in 2024, driven by an increase in data breaches and ransomware attacks. Daum highlights the

React to this headline:

Loading spinner

The future of cyber insurance: Meeting the demand for non-attack coverage Read More »

Ransomware activity shows no signs of slowing down

Ransomware activity shows no signs of slowing down 2024-10-03 at 06:01 By Help Net Security Ransomware attacks have seen a significant resurgence, disrupting multiple sectors and affecting global supply chains. Despite efforts to disrupt major ransomware groups, incidents continue to rise, signaling an ongoing and growing threat into 2024. In this Help Net Security round-up,

React to this headline:

Loading spinner

Ransomware activity shows no signs of slowing down Read More »

Zero-Day Breach at Rackspace Sparks Vendor Blame Game

Zero-Day Breach at Rackspace Sparks Vendor Blame Game 2024-10-02 at 21:01 By Ryan Naraine A breach at Rackspace exposes the fragility of the software supply chain, triggering a blame game among vendors over an exploited zero-day. The post Zero-Day Breach at Rackspace Sparks Vendor Blame Game appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

Zero-Day Breach at Rackspace Sparks Vendor Blame Game Read More »

4 new LockBit-related arrests, identities of suspected Evil Corp members, affiliates revealed

4 new LockBit-related arrests, identities of suspected Evil Corp members, affiliates revealed 2024-10-02 at 12:46 By Zeljka Zorz The third phase of Operation Cronos, which involved officers from the UK National Crime Agency (NCA), the FBI, Europol and other law enforcement agencies, has resulted in the arrest of four persons for allegedly participating in the

React to this headline:

Loading spinner

4 new LockBit-related arrests, identities of suspected Evil Corp members, affiliates revealed Read More »

More LockBit Hackers Arrested, Unmasked as Law Enforcement Seizes Servers

More LockBit Hackers Arrested, Unmasked as Law Enforcement Seizes Servers 2024-10-01 at 18:46 By Eduard Kovacs Previously seized LockBit websites have been used to announce more arrests, charges and infrastructure disruptions. The post More LockBit Hackers Arrested, Unmasked as Law Enforcement Seizes Servers appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS

React to this headline:

Loading spinner

More LockBit Hackers Arrested, Unmasked as Law Enforcement Seizes Servers Read More »

Use Windows event logs for ransomware investigations, JPCERT/CC advises

Use Windows event logs for ransomware investigations, JPCERT/CC advises 2024-10-01 at 13:46 By Zeljka Zorz The JPCERT Coordination Center – the first Computer Security Incident Response Team established in Japan – has compiled a list of entries in Windows event logs that could help enterprise defenders respond to human-operated ransomware attacks and potentially limit the

React to this headline:

Loading spinner

Use Windows event logs for ransomware investigations, JPCERT/CC advises Read More »

UMC Health System Diverts Patients Following Ransomware Attack

UMC Health System Diverts Patients Following Ransomware Attack 2024-10-01 at 12:46 By Ionut Arghire UMC Health System has been forced to divert patients after a ransomware attack resulted in a network outage. The post UMC Health System Diverts Patients Following Ransomware Attack appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed

React to this headline:

Loading spinner

UMC Health System Diverts Patients Following Ransomware Attack Read More »

Patelco Credit Union Data Breach Impacts Over 1 Million People

Patelco Credit Union Data Breach Impacts Over 1 Million People 2024-09-30 at 19:16 By Ionut Arghire Patelco Credit Union has informed authorities that data on more than 1 million individuals was stolen in a ransomware attack this summer. The post Patelco Credit Union Data Breach Impacts Over 1 Million People appeared first on SecurityWeek. This

React to this headline:

Loading spinner

Patelco Credit Union Data Breach Impacts Over 1 Million People Read More »

Hawaii Health Center Discloses Data Breach After Ransomware Attack

Hawaii Health Center Discloses Data Breach After Ransomware Attack 2024-09-30 at 17:31 By Eduard Kovacs Community Clinic of Maui says a LockBit ransomware attack from earlier this year has resulted in a data breach impacting over 120,000 people. The post Hawaii Health Center Discloses Data Breach After Ransomware Attack appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

Hawaii Health Center Discloses Data Breach After Ransomware Attack Read More »

Microsoft: Cloud Environments of US Organizations Targeted in Ransomware Attacks

Microsoft: Cloud Environments of US Organizations Targeted in Ransomware Attacks 2024-09-30 at 15:06 By Ionut Arghire A threat actor has been compromising the hybrid cloud environments of US organizations in multiple sectors. The post Microsoft: Cloud Environments of US Organizations Targeted in Ransomware Attacks appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Microsoft: Cloud Environments of US Organizations Targeted in Ransomware Attacks Read More »

Scroll to Top