Ransomware
10 Effective Strategies to Protect Your Data Storage and Backup from Ransomware
Ransomware attacks are on the rise, posing a significant threat to businesses and individuals alike. One of the most critical aspects of safeguarding your valuable data is to protect your storage and backup systems from ransomware attacks. In this article, we’ll explore ten proactive strategies to fortify your defenses and ensure your data remains secure, […]
Ransomware news headlines trending on Google
The HelloKitty Ransomware, a malicious software that has been causing havoc since 2020, is making headlines on Google News for a rather peculiar reason. An individual identifying as Gookee has taken responsibility for leaking the source code of this specific version of ransomware on a Russian-speaking cyber forum. Gookee has gone a step further by […]
Cybersecurity news headlines trending on Google
The Navy Exchange Service‘s sale of Lenovo laptops at steep discounts and duty-free rates has raised concerns among U.S. lawmakers due to the manufacturer’s ties to the People’s Republic of China. There are apprehensions that these laptops could potentially contain pre-installed malware aimed at spying on users in Western countries. While currently, this is only […]
Trending Ransomware News headlines on Google
Investigation Deepens into MGM Resorts Hack and Caesars Entertainment Ransomware Attack Recent developments in the ongoing investigation into the MGM Resorts hack and the Caesars Entertainment ransomware attack have shed new light on the culprits behind these cybercrimes. Law enforcement agencies working on the case have revealed that the individuals responsible for these attacks are […]
Killware vs. Ransomware: Key Differences
In the realm of cybersecurity threats, the terms “Killware” and “Ransomware” often surface in discussions. While both are malicious software designed to disrupt computer systems, they serve distinct purposes and operate in different ways. This article delves into the concepts of killware and ransomware, highlighting their differences and shedding light on the unique threats they […]
Ransomware targets over 5000 government email addresses
The Sri Lankan Government has recently reported a significant data loss incident involving over 5000 email accounts spanning from May to August 2023. The primary cause of this data loss was identified as a cyber attack, specifically a ransomware variant. Unfortunately, the situation has been exacerbated by the fact that even the backup servers were […]
Ransomware spreading gang reveals visa details of working employees in America
In an unprecedented turn of events in the United States, a relatively obscure ransomware group has committed a grave act by exposing the personal information of individuals who held work visas in the country. This audacious breach took place earlier this year when the group targeted Sabre’s database. Faced with the unyielding demands of the […]
Considerations to be made when dealing with Ransomware Payments
When a server falls victim to a ransomware infection, the urgency to regain access to critical data often leads to a difficult decision: paying the hackers’ demands. However, the reliability of ransomware criminals in conducting their “business” is far from guaranteed. Are Ransomware Payments Legal? First and foremost, it’s essential to understand that paying a […]
LockBit hackers steal sensitive documents from Britain Military Defense
The United Kingdom’s Ministry of Defense has once again found itself in the spotlight due to a recent cyberattack, with fingers of suspicion pointing towards Russian hackers. While there is no conclusive evidence to substantiate these claims, there is a growing belief that Russia may be behind the latest data breach. Social media platforms, such […]
Ransomware spreading gangs start Customer Service
In recent times, the landscape of ransomware attacks has evolved, with threat actors altering their strategies. The common practice of encrypting databases and demanding ransoms has given way to a more nuanced approach. As cyber criminals have started adopting a new tactic known as “encryption-less” ransomware attacks. Previously, adversaries employed double extortion tactics, stealing a […]