Pages
Posts by category
- Category: Cybercrime
- Category: Carding
- Category: Darkweb
- Category: Fraud
- Category: The Deep Web
- Category: Hackers
- Category: Breaches
- BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability
- Hackers Repurpose RansomHub’s EDRKillShifter in Medusa, BianLian, and Play Attacks
- RedCurl Shifts from Espionage to Ransomware with First-Ever QWCrypt Deployment
- VSCode Marketplace Removes Two Extensions Deploying Early-Stage Ransomware
- Kaspersky Links Head Mare to Twelve, Targeting Russian Entities via Shared C2 Servers
- Medusa Ransomware Uses Malicious Driver to Disable Anti-Malware with Stolen Certificates
- ClearFake Infects 9,300 Sites, Uses Fake reCAPTCHA and Turnstile to Spread Info-Stealers
- Leaked Black Basta Chats Suggest Russian Officials Aided Leader’s Escape from Armenia
- SANS Institute Warns of Novel Cloud-Native Ransomware Attacks
- Live Ransomware Demo: See How Hackers Breach Networks and Demand a Ransom
- FIN7, FIN8, and Others Use Ragnar Loader for Persistent Access and Ransomware Operations
- Authorities Claim LockBit Admin “LockBitSupp” Has Engaged with Law Enforcement
- Medusa Ransomware Hits 40+ Victims in 2025, Demands $100K–$15M Ransom
- EncryptHub Deploys Ransomware and Stealer via Trojanized Apps, PPI Services, and Phishing
- The New Ransomware Groups Shaking Up 2025
- Hackers Exploit Paragon Partition Manager Driver Vulnerability in Ransomware Attacks
- RDP: a Double-Edged Sword for IT Teams – Essential Yet Exploitable
- CERT-UA Warns of UAC-0173 Attacks Deploying DCRat to Compromise Ukrainian Notaries
- Leaked Black Basta Ransomware Chat Logs Reveal Inner Workings and Internal Conflicts
- 5 Active Malware Campaigns in Q1 2025
- Becoming Ransomware Ready: Why Continuous Validation Is Your Best Defense
- China-Linked Attackers Exploit Check Point Flaw to Deploy ShadowPad and Ransomware
- RansomHub Becomes 2024’s Top Ransomware Group, Hitting 600+ Organizations Globally
- RA World Ransomware Attack in South Asia Links to Chinese Espionage Toolset
- FBI, Europol, and NCA Take Down 8Base Ransomware Data Leak and Negotiation Sites
- Hackers Exploiting SimpleHelp RMM Flaws for Persistent Access and Ransomware
- Top 3 Ransomware Threats Active in 2025
- Ransomware Extortion Drops to $813.5M in 2024, Down from $1.25B in 2023
- Crazy Evil Gang Targets Crypto with StealC, AMOS, and Angel Drainer Malware
- What Is Attack Surface Management?
- How Interlock Ransomware Infects Healthcare Organizations
- Ransomware Targets ESXi Systems via Stealthy SSH Tunnels for C2 Operations
- TRIPLESTRENGTH Hits Cloud for Cryptojacking, On-Premises Systems for Ransomware
- QakBot-Linked BC Malware Adds Enhanced Remote Access and Data Gathering Features
- Experts Find Shared Codebase Linking Morpheus and HellCat Ransomware Payloads
- Python-Based Malware Powers RansomHub Ransomware to Exploit Network Flaws
- Hackers Hide Malware in Images to Deploy VIP Keylogger and 0bj3ctivity Stealer
- The High-Stakes Disconnect For ICS/OT Security
- CISA Adds Second BeyondTrust Flaw to KEV Catalog Amid Active Attacks
- Ransomware on ESXi: The Mechanization of Virtualized Attacks
- DoJ Indicts Three Russians for Operating Crypto Mixers Used in Cybercrime Laundering
- Webinar: Learn How to Stop Encrypted Attacks Before They Cost You Millions
- AI-Driven Ransomware FunkSec Targets 85 Victims Using Double Extortion Tactics
- Top 5 Malware Threats to Prepare Against in 2025
- Category: Phishing
- Category: Malware
- Category: Security
Forums
Topics
Back to top button