Home Search

ransomware - search results

If you're not happy with the results, please do another search
BERT Ransomware Can Forcibly Shut Down ESXi Virtual Machines to Disrupt Recovery

BERT Ransomware Forcibly Shut Down ESXi Virtual Machines to Disrupt Recovery

New ransomware group employs advanced virtualization attack tactics to maximize damage and hinder organizational recovery efforts. A newly emerged ransomware group known as BERT has...
Ingram Micro Ransomware Attack

IT Gain Ingram Micro Internal Systems Hit by Ransomware Attack

Global technology distributor Ingram Micro has confirmed that its internal systems have been compromised by ransomware, leading to significant operational disruptions across its worldwide...

213% Increase in Ransomware Attacks Targeting Organizations With First Quarter of 2025

The first quarter of 2025 has witnessed an unprecedented surge in ransomware attacks, with 2,314 victims listed across 74 unique data leak sites, representing...

Cl0p Ransomware Data Exfiltration Vulnerable to RCE Attacks

A newly identified security vulnerability in the Cl0p ransomware group's data exfiltration utility has exposed a critical remote code execution (RCE) flaw that security...
Aeza Bulletproof Hosting Provider Sanctioned

U.S. Treasury Sanctioned Bulletproof Hosting Provider Used by Ransomware Operator Groups

The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) has imposed comprehensive sanctions on Aeza Group, a Russia-based bulletproof hosting (BPH)...

New DEVMAN Ransomware From DragonForce Attacking Windows 10 and 11 Users

A sophisticated new ransomware variant identified as DEVMAN has emerged from the DragonForce ransomware-as-a-service ecosystem, targeting both Windows 10 and Windows 11 systems with...

DragonForce Ransomware Empowers Affiliates with Modular Toolkit to Create Custom Ransomware Payloads

DragonForce ransomware has emerged as one of the most sophisticated threats in the cybercriminal ecosystem, transforming from a hacktivist collective into a mature Ransomware-as-a-Service...

New Report Unveils Most of The Ransomware Attacks Targeting Organizations Via Exploited Vulnerabilities

A comprehensive analysis of the global ransomware landscape has revealed that exploited vulnerabilities remain the dominant attack vector, accounting for 32% of all successful...
RansomHub Ransomware RDP Servers

RansomHub Ransomware Attacking RDP Servers Using Mimikatz and Advanced IP Scanner Tools

A recent incident response investigation from THE DFIR report has revealed the sophisticated tactics employed by RansomHub ransomware operators in a coordinated attack campaign...
Qilin Ransomware Emerges as Top Threat Exploiting Vulnerabilities

Qilin Ransomware Emerges as World’s Top Threat, Demands $50 Million Ransom

Qilin ransomware has rapidly ascended to become the world's most prevalent ransomware threat, accumulating over $50 million in ransom payments throughout 2024 alone.  Originally developed...

Exclusive Stories