Home Search
ransomware - search results
If you're not happy with the results, please do another search
LockBit Ransomware Infrastructre taken Down by Global Law Enforcement Agencies
In a significant blow to the global ransomware landscape, international law enforcement agencies have successfully disrupted the operations of the LockBit ransomware gang, one...
Ransomware Payments Hitting Record High, Exceed $1 Billion
Chainalysis, a leading blockchain analysis firm, has recently released a report on ransomware payments revealing that they have skyrocketed to a whopping $1 billion...
LockBit Ransomware Group Demands $11 Million From Government to Unlock Files
A devastating ransomware attack by Lockbit recently targeted the charming city of Calvià in Majorca, Spain, which is well-known for its tourism appeal.
This incident...
LockBit Ransomware Gang Claims Cyber Attack on Subway
An infamous cybercriminal group known as LockBit Ransomware recently targeted Subway's food chain, unleashing a vicious attack that could potentially lead to the exposure...
ThreeAM Ransomware Attacking Small & Medium Companies
For financial gain, hackers exploit ransomware through which they encrypt victims' data and then demand a ransom payment in exchange for its release.
It shows...
Hackers Abuse TeamViewer to Launch Ransomware Attacks
Hackers exploit TeamViewer because it gives remote access to systems and allows threat actors to control them.
This can be used for several illicit purposes...
Babuk Ransomware Decryptor Updated to Recover Files Infected by Latest Variant
Hackers use ransomware to encrypt victims' files and render them inaccessible until a ransom is paid. This forces the victims to pay a ransom...
Hackers Impersonating as Security Researcher to Aid Ransomware Victims
Hackers impersonate security researchers to exploit trust and credibility. By posing as legitimate figures in the cybersecurity community, they:
Gain access to sensitive information
Manipulate victims...
Top 10 Notorious Ransomware Gangs of 2023
By employing a multitude of advanced techniques like double extortion along with other illicit tactics, ransomware groups are continually evolving at a rapid pace.
In...
Ransomware Attackers Exploit Windows Zero-day to Exploit Privileges
Ransomware attackers exploit Windows zero-day vulnerabilities to gain elevated privileges. Zero-day vulnerabilities are undisclosed flaws that provide a direct way to bypass security measures.
By...