EHA
Home Search

ransomware - search results

If you're not happy with the results, please do another search
LockBit Ransomware Infrastructre taken Down by Global Law Enforcement Agencies

LockBit Ransomware Infrastructre taken Down by Global Law Enforcement Agencies

In a significant blow to the global ransomware landscape, international law enforcement agencies have successfully disrupted the operations of the LockBit ransomware gang, one...
Ransomware Payments Hitting Record High, Exceed $1 Billion

Ransomware Payments Hitting Record High, Exceed $1 Billion

Chainalysis, a leading blockchain analysis firm, has recently released a report on ransomware payments revealing that they have skyrocketed to a whopping $1 billion...
LockBit Ransomware Group Demands $11 Million From Government to Unlock Files

LockBit Ransomware Group Demands $11 Million From Government to Unlock Files

A devastating ransomware attack by Lockbit recently targeted the charming city of Calvià in Majorca, Spain, which is well-known for its tourism appeal. This incident...
LockBit Ransomware Gang Claims Cyber Attack on Subway

LockBit Ransomware Gang Claims Cyber Attack on Subway

An infamous cybercriminal group known as LockBit Ransomware recently targeted Subway's food chain, unleashing a vicious attack that could potentially lead to the exposure...
ThreeAM Ransomware Attacking Small & Medium Companies

ThreeAM Ransomware Attacking Small & Medium Companies

For financial gain, hackers exploit ransomware through which they encrypt victims' data and then demand a ransom payment in exchange for its release. It shows...
Hackers Abuse TeamViewer to Launch Ransomware Attacks

Hackers Abuse TeamViewer to Launch Ransomware Attacks

Hackers exploit TeamViewer because it gives remote access to systems and allows threat actors to control them. This can be used for several illicit purposes...
Babuk Ransomware Decryptor Updated to Recover Files Infected by Latest Variant

Babuk Ransomware Decryptor Updated to Recover Files Infected by Latest Variant

Hackers use ransomware to encrypt victims' files and render them inaccessible until a ransom is paid. This forces the victims to pay a ransom...
Hackers Impersonating as Security Researcher to Aid Ransomware Victims

Hackers Impersonating as Security Researcher to Aid Ransomware Victims

Hackers impersonate security researchers to exploit trust and credibility. By posing as legitimate figures in the cybersecurity community, they: Gain access to sensitive information Manipulate victims...
Top 10 Notorious Ransomware Gangs of 2023

Top 10 Notorious Ransomware Gangs of 2023

By employing a multitude of advanced techniques like double extortion along with other illicit tactics, ransomware groups are continually evolving at a rapid pace. In...
Ransomware Attackers Exploit Windows Zero-day to Exploit Privileges

Ransomware Attackers Exploit Windows Zero-day to Exploit Privileges

Ransomware attackers exploit Windows zero-day vulnerabilities to gain elevated privileges. Zero-day vulnerabilities are undisclosed flaws that provide a direct way to bypass security measures. By...

Managed WAF

Website

Latest News