FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Oracle Check Point Cloudflare Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Ransomware

20 articles

Microsoft Security Blog Ransomware Microsoft 4d ago

Storm-1175 focuses gaze on vulnerable web-facing assets in high-tempo Medusa ransomware operations

The financially motivated cybercriminal threat actor Storm-1175 operates high-velocity ransomware campaigns that weaponize recently disclosed vulnerabilities...

T1041

Microsoft Security Blog →

SC Media Ransomware 4d ago

German authorities identify alleged leader of GandCrab and REvil ransomware gangs

Daniil Maksimovich Shchukin, also known online as UNKN or UNKNOWN, allegedly headed GandCrab and REvil, pioneering the double extortion tactic.

SC Media →

Security Affairs Ransomware 4d ago

BKA unmasks two REvil Ransomware operators behind 130+ German attacks

German police BKA identified two key REvil ransomware members, linking them to over 130 attacks in Germany. Germany’s Federal Criminal Police (BKA) has ident...

Security Affairs →

GBHackers Ransomware 4d ago

Alleged REvil Leader ‘UNKN’ Identified by German Authorities in New Takedown Effort

German authorities have officially put a face to one of the most notorious names in cybercrime. The German Federal Criminal Police (BKA) recently identified ...

GBHackers →

The Hacker News Ransomware Cisco Trend Micro 4d ago

Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools

Threat actors associated with Qilin and Warlock ransomware operations have been observed using the bring your own vulnerable driver (BYOVD) technique to sile...

The Hacker News →

The Hacker News Ransomware 4d ago

BKA Identifies REvil Leaders Behind 130 German Ransomware Attacks

Germany's Federal Criminal Police Office (aka BKA or the Bundeskriminalamt) has unmasked the real identity of the main threat actors associated with the now-...

T1588

The Hacker News →

Krebs on Security Ransomware 4d ago

Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab

An elusive hacker who went by the handle "UNKN" and ran the early Russian ransomware groups GandCrab and REvil now has a name and a face. Authorities in Germ...

Krebs on Security →

Security Affairs Ransomware 5d ago

Security Affairs newsletter Round 571 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box.

Security Affairs →

SC Media Ransomware Apr 3

Accelerated Akira ransomware intrusions examined

CyberScoop reports that increasingly efficient techniques have significantly reduced the Akira ransomware operation's attack times.

SC Media →

BleepingComputer Ransomware Apr 3

Evolution of Ransomware: Multi-Extortion Ransomware Attacks

Multi-extortion ransomware relies on stolen data to pressure victims with public leaks. Penta Security explains how its D.

T1041

BleepingComputer →

GBHackers Ransomware Apr 3

Phorpiex Botnet Fuels Ransomware, Sextortion, and Crypto-Theft Attacks

Hackers are abusing the long-running Phorpiex (Trik) botnet to run large-scale ransomware, sextortion, and crypto-clipping operations, turning one infrastruc...

GBHackers →

SC Media Ransomware Apr 2

Ransomware intrusion compromises North Dakota water treatment facility

North Dakota's Minot Water Treatment Plant, which serves roughly 80,000 people in Minot and surrounding communities, had its SCADA system impacted by a ranso...

SC Media →

SC Media Ransomware Apr 2

Third-party hack affirmed by Nissan after Everest ransomware assertions

Major Japanese multinational automaker Nissan has confirmed having its data compromised in a cyberattack against a third-party vendor earlier this year after...

SC Media →

SC Media Ransomware Apr 2

Ransomware attackers increasingly exploit legitimate IT tools, bypassing antivirus

Attackers are leveraging tools like Process Hacker and IOBit Unlocker, which possess deep operating system access.

SC Media →

SC Media Ransomware Apr 2

Hasbro confirms cyberattack, expects weeks-long resolution

The specific type of cyberattack, such as ransomware, has not been disclosed by Hasbro.

SC Media →

Cyberscoop Ransomware Apr 2

Akira ransomware group can achieve initial access to data encryption in less than an hour

A new report from Halcyon finds that the group also puts more effort than usual into developing working decryptors, likely to incentivize businesses to pay u...

Cyberscoop →

Help Net Security Ransomware Google Apple Apr 2

Software supply chain hacks trigger wave of intrusions, data theft

After linking the Axios npm supply chain attack to North Korean hackers, Google researchers warned that “hundreds of thousands of stolen secrets could potent...

T1041 T1195

Help Net Security →

GBHackers Ransomware Microsoft Apr 2

Akira-Style Ransomware Campaign Hits Windows Users Across South America

A newly identified ransomware campaign is targeting Windows users across South America, leveraging tactics that closely mimic the notorious Akira ransomware ...

GBHackers →

Infosecurity Magazine Ransomware Apr 2

Researchers Observe Sub-One-Hour Ransomware Attacks

Halcyon says Akira is now capable of carrying out an entire ransomware attack in less than an hour

Infosecurity Magazine →

The Record Ransomware Apr 1

North Dakota water treatment plant reports March ransomware attack

A water treatment plant in the city of Minot, North Dakota, was hit with ransomware but city officials said it continues to operate normally.

The Record →

« Prev 1 2 3 4 ... 7 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA