New research from Trellix detailed that CrazyHunter ransomware has emerged as a serious and escalating threat, underscoring the growing sophistication of modern cybercriminal operations.
The GRIT 2026 Ransomware & Cyber Threat Report provides exclusive in-depth research, insights and analysis on a year of record-breaking ransomware activity, examining who cybercriminals are targeting ...
A new report out today from endpoint security firm Morphisec Inc. reveals the resurgence of Pay2Key, a ransomware operation with ties to Iran’s Fox Kitten advanced persistent threat group, now ...
DeadLock ransomware relies on Polygon smart contracts to spin proxy servers to produce a nearly unshuttable infrastructure.
Healthcare organizations are facing evolving ransomware tactics as data extortion attacks are on the rise. Cyber attackers are taking advantage of the sensitive data held by healthcare providers to ...
Hot on the heels of a major ransomware group being taken down through an international law enforcement operation comes a new development that highlights the whack-a-mole nature of such actions: A new ...
No, it's not new or particularly exotic, but after years of attacks, ransomware continues to rank among the most destructive threats facing global organizations today. Even with security teams pouring ...
The spread of ransomware attacks across global enterprises necessitates specialized ransomware recovery services to close important gaps in overall cybersecurity response. Moreover, what used to be ...
An emerging ransomware cybercriminal group is putting its own twist on file encryption, with a Linux variant of its malware that can run up to 100 encryption threads in parallel and supports partial ...
The overwhelming majority of organizations has been targeted by a ransomware attack in the last 12 months, according to a new study from Active Directory security firm Semperis. 78% of the IT ...
Ransomware can target identity, bypassing technical defences. Boards should prioritise identity security, align investments, and embed risk in governance.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results