When Microsoft patched a vulnerability last summer that allowed threat actors to use Windows’ shortcut (.lnk) files in ...
New partnership improves the ability of organizations to better detect, respond to and recover from ransomware attacks.
Workforce monitoring software was abused in two cases of attempted ransomware attacks, researchers from Huntress found.
Ransomware groups are back at encrypting victim data for extortion, in addition to exfiltrating it, increasing chances of ...
Even top-of-the-range antivirus software can’t restore encrypted data unless a certain decryption key has been developed for ...
As ransomware recedes, a new more dangerous digital parasite rises ...
Gang walks away with nothing, victims are left with irreparable hypervisors Cybersecurity experts usually advise victims ...
Researchers revealed a Phorpiex-distributed phishing campaign using malicious LNK files to deploy Global Group ransomware ...
Nitrogen ransomware’s ESXi encryptor corrupts its own public key, making file recovery impossible, even if victims pay.
Polish police have detained a 47-year-old man suspected of ties to the Phobos ransomware group and seized computers and mobile phones containing stolen credentials, credit card numbers, and server ...
When corporate data is exposed on a dedicated leak site, the consequences linger long after the attack fades from the news cycle.