EHA
Home Search

ransomware leak - search results

If you're not happy with the results, please do another search
Yellow Pages Hack

Yellow Pages Hack – Ransomware Gang Leaks Sensitive Data

As per reports, Yellow Pages Group, the Canadian Directory Publisher, has been attacked by the Black Basta Ransomware Group. The threat actor also took responsibility...
Ragnar Locker Ransomware

Hackers Behind Ragnar Locker Ransomware Threatens to Leak Stolen Data If Victims Inform FBI/Police

The Ragnar Locker ransomware gang is adopting a new technique where they are forcing the victim to pay the ransom, where the operators are...
ADATA Suffers 700 GB Data Leak

Computer Storage Chip Maker ADATA Suffers 700 GB Data Leak In Ragnar Locker Ransomware...

ADATA, a Taiwanese memory and storage manufacturer, suffers a massive data leak in the Ragnar Locker Ransomware attack where hackers have published download links...
Egregor Ransomware Operators Threaten Companies To Pay Ransom in 3 Days Else They Leak Data Online

Egregor Ransomware Operators Threaten Companies To Pay Ransom in 3 Days Else They Leak...

Recently, the Egregor ransomware operators hacked into the companies to steal sensitive data and encrypt them. Not only this, but the threat actors have...
DarkGPT – AI OSINT Tool to Detect Leaked Databases

DarkGPT – AI OSINT Tool to Detect Leaked Databases

⁤AI (Artificial Intelligence) systems can process large amounts of data and uncover threats that human beings might overlook. ⁤ This makes quick action possible, as...
Cybersec Firm i-Soon Leak Exposes The Tools Used By Chinese Hackers

CyberSec Firm i-Soon Leak Exposes The Tools Used By Chinese Hackers

A cybersecurity company data breach could be extremely damaging as it not only compromises sensitive client information but also corrupts the trust in the...
Authorities Dismantled SugarLocker Ransomware Group

Authorities Dismantled SugarLocker Ransomware Group

Russian authorities have successfully dismantled a notorious ransomware gang known as SugarLocker, arresting three of its alleged members. The group, which masqueraded as a legitimate...
ThreeAM Ransomware Attacking Small & Medium Companies

ThreeAM Ransomware Attacking Small & Medium Companies

For financial gain, hackers exploit ransomware through which they encrypt victims' data and then demand a ransom payment in exchange for its release. It shows...
Babuk Ransomware Decryptor Updated to Recover Files Infected by Latest Variant

Babuk Ransomware Decryptor Updated to Recover Files Infected by Latest Variant

Hackers use ransomware to encrypt victims' files and render them inaccessible until a ransom is paid. This forces the victims to pay a ransom...
Hackers Impersonating as Security Researcher to Aid Ransomware Victims

Hackers Impersonating as Security Researcher to Aid Ransomware Victims

Hackers impersonate security researchers to exploit trust and credibility. By posing as legitimate figures in the cybersecurity community, they: Gain access to sensitive information Manipulate victims...

Managed WAF

Website

Latest News