Majority of Ransomware Attacks Last Year Exploited Old Bugs
New research shows that 57 vulnerabilities that threat actors are currently using in ransomware attacks enable everything from initial access…
New research shows that 57 vulnerabilities that threat actors are currently using in ransomware attacks enable everything from initial access…
BEC gangs Midnight Hedgehog and Mandarin Capybara show how online marketing and translation tools are making it easy for these…
Security researchers are seeing threat actors switching to a new and open-source command and control (C2) framework known as Havoc…
From ongoing attacks targeting ESXi servers to sanctions on Conti/TrickBot members, it has been quite a busy week regarding ransomware.…
The City of Oakland was hit by a ransomware attack on Wednesday night that forced it to take all systems…
Russian citizen Denis Mihaqlovic Dubnikov pleaded guilty on Tuesday to laundering money for the notorious Ryuk ransomware group for over…
Royal Ransomware is the latest ransomware operation to add support for encrypting Linux devices to its most recent malware variants,…
By Dr. Yvonne Bernard, CTO, Hornetsecurity Criminals are increasingly using fake emails to exploit their victims for financial gain and…
While the week started slowly, it turned into a big ransomware mess, with attacks striking a big blow at businesses…
The complex nature of cyberattacks has increased demand for software developers, reverse engineers, and offensive specialists — attracting workers facing…