Bitdefender has released a decryptor for the 'ShrinkLocker' ransomware strain, which uses Windows' built-in BitLocker drive encryption tool to lock victim's files. Discovered in May 2024 by ...
Halliburton has revealed that an August ransomware attack has led to $35 million in losses after the breach caused the company to shut down IT systems and disconnect customers. Halliburton is a ...
Researchers spotted a brand new Ymir ransomware This new strain teamed up with a group deploying infostealers There is a chance that the entire operation was done by a single actor Two hacking ...
A ransomware group claims to have stolen 1.15 terabytes of data from Memorial Hospital and Manor, a healthcare provider based in Bainbridge, Ga., BankInfoSecurity reported Nov. 11. The group ...
ESET researchers have discovered new Rust-based tooling leading to the deployment of Embargo ransomware. Embargo is a relatively new player in the ransomware scene, first observed by ESET in June ...
Ransomware attacks have become ever more sophisticated. Attackers no longer just encrypt data – they threaten to expose sensitive data, though double extortion and triple extortion attacks. And ...
Incident response firm GuidePoint Security is tracking around 70 ransomware groups, mostly from Eastern Europe but some from Iran, North Korea, and China. Some will settle for 50% of the original ...
There is one sort of attack that illustrates this transition better than most: ransomware. Ransomware is an extremely lucrative example of computer crime going "corporate": incentivized by the ...
The Embargo ransomware group is deploying customized Rust-based tooling to overcome cybersecurity defenses, according to ESET researchers. The new toolkit was observed during ransomware incidents ...
The Calgary Public Library says its teams have confirmed last week's cybersecurity incident was the result of an attempted ransomware attack. "As of today we can confirm our cybersecurity ...
The transformative role of automation in cybersecurity As ransomware attacks become increasingly sophisticated and relentless, manual cybersecurity processes find it challenging to keep up. The latest ...