ransomware

foxconn headpic.jpg

Foxconn confirms cyberattack claimed by way of Nitrogen ransomware gang

Foxconn, the arena’s greatest electronics producer, says a few of its North American factories are actually running to renew customary operations after a cyberattack. The electronics massive has over 900,000 workers throughout over 240 campuses in 24 nations and reported revenues of over $260 billion in 2025. The corporate is ranked twenty eighth in Fortune […]

Foxconn confirms cyberattack claimed by way of Nitrogen ransomware gang Read More »

apple hacked.jpg

Apple provider Foxconn confirms ransomware atack affected North American factories

WIRED experiences that Foxconn stated that a few of its North American factories “suffered a cyberattack” in fresh days, after the ransomware workforce Nitrogen claimed to have stolen 8TB of information from the corporate. Listed here are the main points. Foxconn effectively attacked over again In keeping with WIRED, a ransomware workforce referred to as

Apple provider Foxconn confirms ransomware atack affected North American factories Read More »

ssecurity harvard.jpg

The Canvas Hack Is a New More or less Ransomware Debacle

Upper training has lengthy been a goal of ransomware gangs and information extortion assaults. However by no means earlier than, most likely, has a cyberattack in opposition to a unmarried tool platform so completely disrupted the day by day operations of 1000’s of colleges throughout america. The commonly used virtual studying platform Canvas used to

The Canvas Hack Is a New More or less Ransomware Debacle Read More »

acronis hacked head holding.jpg

Why ransomware assaults be triumphant even if backups exist

Written by way of Subramani Raom Senior Supervisor, Cybersecurity Answers Technique at Acronis Your backup plan almost certainly received’t continue to exist a ransomware assault. Why? As a result of backups fail all the way through ransomware assaults when attackers intentionally goal and ruin backup techniques ahead of launching encryption. In fashionable assaults, backup infrastructure

Why ransomware assaults be triumphant even if backups exist Read More »

iranian hacker.jpg

MuddyWater hackers use Chaos ransomware as a decoy in assaults

The MuddyWater Iranian hackers disguised their operations as a Chaos ransomware assault, depending on  Microsoft Groups social engineering to achieve get right of entry to and identify endurance. Even supposing the assault concerned credential robbery, endurance, far flung get right of entry to, knowledge exfiltration, extortion emails, and an access at the Chaos leak portal,

MuddyWater hackers use Chaos ransomware as a decoy in assaults Read More »

cpanel datacenter.jpg

Critrical cPanel flaw mass-exploited in “Sorry” ransomware assaults

A brand new disclosed cPanel flaw tracked as CVE-2026-41940 is being mass-exploited to breach web sites and encrypt information in “Sorry” ransomware assaults. This week, an emergency replace for WHM and cPanel was once launched to mend a crucial authentication bypass flaw that permits attackers to get admission to regulate panels. WHM and cPanel are

Critrical cPanel flaw mass-exploited in “Sorry” ransomware assaults Read More »

blackcat.jpg

US ransomware negotiators get 4 years in jail over BlackCat assaults

Two former workers of cybersecurity incident reaction corporations Sygnia and DigitalMint had been sentenced to 4 years in jail each and every for focused on U.S. corporations in BlackCat (ALPHV) ransomware assaults. 40-year-old Ryan Clifford Goldberg (a former Sygnia incident reaction supervisor) and 36-year-old Kevin Tyler Martin (a DigitalMint ransomware negotiator) had been charged in

US ransomware negotiators get 4 years in jail over BlackCat assaults Read More »

ransomware.jpg

Damaged VECT 2.0 ransomware acts as a knowledge wiper for massive information

Researchers are caution that the VECT 2.0 ransomware has an issue in how it handles encryption nonces that ends up in completely destroying better information slightly than encrypt them. VECT has been marketed on one of the vital newest BreachForums iterations, inviting registered customers to change into associates, and distributing get admission to keys by

Damaged VECT 2.0 ransomware acts as a knowledge wiper for massive information Read More »

trigona header.jpg

Trigona ransomware assaults use customized exfiltration software to thieve information

Lately seen Trigona ransomware assaults are the usage of a customized, command-line software to thieve information from compromised environments quicker and extra successfully. The software used to be emplayed in assaults in March that had been attributed to a gang associate, most probably as a way to steer clear of publicly to be had equipment,

Trigona ransomware assaults use customized exfiltration software to thieve information Read More »

ransomware 3.jpg

Kyber ransomware gang toys with post-quantum encryption on Home windows

A brand new Kyber ransomware operation is concentrated on Home windows techniques and VMware ESXi endpoints in fresh assaults, with one variant enforcing Kyber1024 post-quantum encryption. Cybersecurity company Rapid7 retrieved and analyzed two distinct Kyber variants in March 2026 all over an incident reaction. Each variants have been deployed at the identical community, with one

Kyber ransomware gang toys with post-quantum encryption on Home windows Read More »