Group-IB researchers said the most unusual aspect of DeadLock lies in its use of Polygon smart contracts to manage ...
Discover how crypto malware operates through cryptojacking and ransomware, with real-world examples such as WannaMine and PowerGhost ...
The lender claims the ransomware gang behind a breach provided proof it deleted compromised customer information, and it hasn ...
Abstract "Double-extortion" ransomware attacks not only encrypt systems but also steal sensitive data. Traditional backups ...
Fix” campaign against Booking.com users, abusing fake CAPTCHAs and Blue Screen of Death errors to deliver malware.
The past year was much quieter than 2024 in ransomware takedown and anti-cybercrime law enforcement operations. Additionally, less organized collectives such as Scattered Spider, Lapsus$ and ...
Black Hat Europe 2025 opened with a presentation by Max Smeets of Virtual Rotes titled ‘Inside the Ransomware Machine’. The talk focused on the LockBit ransomware-as-a-service (RaaS) gang and Max’s ...
Healthcare organizations are facing evolving ransomware tactics as data extortion attacks are on the rise. Cyber attackers are taking advantage of the sensitive data held by healthcare providers to ...
A seasonal surge in malicious activity combined with alliances between ransomware groups led to a 41% increase in attacks between September and October. Cybercriminal group Qilin continues to be the ...
In an encouraging sign that cyber messaging is cutting through among healthcare providers, the sector appears to be becoming increasingly resilient to ransomware and cyber extortion, with fewer ...
NHS England is investigating the possibility that it has fallen victim to a prolific ransomware operation, after the Cl0p (aka Clop) gang claimed to have hacked its systems via a post to its dark web ...
A recent cybersecurity report has found that ransomware payment rates have hit a historic low. This reflects wider trends happening to both larger enterprises and smaller firms. While the report shows ...