Tag: ransomware
-
Univ. of Mississippi Medical Center Dealing With Cyberattack
Hospital, ER Open but All Clinics, Elective Care Cancelled Statewide; FBI Called In. The University of Mississippi Medical Center on Thursday said a ransomware attack has triggered its emergency operations plan and forced its hospitals to cancel all clinic and elective procedures at all locations statewide. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/univ-mississippi-medical-center-dealing-cyberattack-a-30808
-
Why Banks Need AI-Driven Segmentation Against Ransomware
AI-powered ransomware compresses attacks from weeks to minutes. Michael Villar, director of field security technology at Akamai, says banks need AI-driven segmentation to contain intruders fast, limit lateral movement and protect sensitive data before extortion begins. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/banks-need-ai-driven-segmentation-against-ransomware-i-5524
-
Ransomware gang threatens Cheyenne and Arapaho Tribes after shutting down schools
The government of the Cheyenne and Arapaho Tribes in Oklahoma is being extorted by cybercriminals after a ransomware attack shut down its schools and critical systems in January. First seen on therecord.media Jump to article: therecord.media/cheyenne-arapaho-ransomware-rhysida
-
Anteil reiner Daten-Exfiltrationsfälle steigt um das Elffache
Arctic Wolf veröffentlicht seinen jährlichen <>. Die Analyse hunderter realer Incident-Response-Fälle aus 2025 zeigt: Während Ransomware weiterhin dominiert, verschiebt sich das Geschäftsmodell der Angreifer deutlich in Richtung reiner Datenexfiltration. Besonders betroffen sind Unternehmen in Westeuropa darunter Deutschland als führender Industriestandort. Im Jahr 2025 machten Ransomware, Business-E-Mail-Compromise (BEC) und Data-Incidents 92 Prozent […] First seen on…
-
90 Prozent der Ransomware-Angriffe umgehen Firewalls
Ransomware-Angreifer umgehen Firewalls zunehmend über bekannte Sicherheitslücken und verwundbare Konten, und das in einem Tempo, das Verteidigern kaum Zeit zur Reaktion lässt. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/ransomware-2025
-
Advantest Cyberattack Triggers Ransomware Investigation Across Internal Network
Advantest Corporation has confirmed that it is responding to a cybersecurity incident First seen on thecyberexpress.com Jump to article: thecyberexpress.com/advantest-cyberattack-ransomware-investigation/
-
Dragos’ Cybersecurity Report 2026 zur OT-Bedrohung: Ransomware-Angreifer erhöhen operativen Druck auf industrielle Infrastrukturen und KRITIS
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/dragos-cybersecurity-report-2026-ot-bedrohung-ransomware-angreifer-erhoehung-operativer-druck-industrielle-infrastrukturen-kritis
-
Norton Healthcare to Pay $11M to Settle BlackCat Lawsuit
Cybercrime Gang Allegedly Stole 4.7 Terabytes of Data, Affecting 2.5M. Norton Healthcare, which operates nine hospitals and other care facilities in Kentucky and Indiana, has agreed to pay $11 million to settle class action litigation stemming from a 2023 data theft attack by ransomware-as-a-service gang Alphv/BlackCat that affected nearly 2.5 million people. First seen on…
-
0APT ransomware crew makes embarrassing splash
Tags: ransomwareA new ransomware gang called 0APT has attracted attention, but many of its victims may not even be real, and its operators are being accused of over-egging their criminal pudding. First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366639164/0APT-ransomware-crew-makes-embarrassing-splash
-
Hackers Increasingly Prefer Fast and Low-Complexity Attacks
Incident Responders Detail Top Ransomware and Business Email Compromise Tactics. There’s no need to invest into sophisticated hacking operations when moving fast and exploiting well-trod techniques gives threat actors all the access they want. Threat actors are prioritizing low-complexity entry points, rather than investing in sophisticated exploits, say incident responders. First seen on govinfosecurity.com Jump…
-
Telegram channels expose rapid weaponization of SmarterMail flaws
Underground Telegram channels shared SmarterMail exploit PoCs and stolen admin credentials within days of disclosure. Flare explains how monitoring these communities reveals rapid weaponization of CVE-2026-24423 and CVE-2026-23760 tied to ransomware activity. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/telegram-channels-expose-rapid-weaponization-of-smartermail-flaws/
-
The era of the Digital Parasite: Why stealth has replaced ransomware
For years, ransomware encryption functioned as the industry’s alarm bell. When systems locked up, defenders knew an attack had occurred. Not anymore. New empirical data show … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/18/picus-security-red-report-identity-driven-cyberattacks/
-
EdTech Magazine – What Minimum Viable Cybersecurity Looks Like for K12 Districts
This article was originally published in EdTech Magazine on 02/11/26 by Didi Gluck. As ransomware and phishing attacks grow more sophisticated, districts can’t rely on perimeter defenses alone. Cybersecurity has become a top priority for K12 districts, not just to keep students safe online but to ensure continuity across devices, systems and end user accounts.…
-
U.S. CISA adds Google Chromium CSS, Microsoft Windows, TeamT5 ThreatSonar Anti-Ransomware, and Zimbra flaws to its Known Exploited Vulnerabilities catalog
Tags: cisa, cybersecurity, exploit, flaw, google, infrastructure, kev, microsoft, ransomware, vulnerability, windowsU.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Google Chromium CSS, Microsoft Windows, TeamT5 ThreatSonar Anti-Ransomware, and Zimbra flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Google Chromium CSS, Microsoft Windows, TeamT5 ThreatSonar Anti-Ransomware, and Zimbra flaws to its Known Exploited Vulnerabilities (KEV) catalog. Below are the flaws…
-
Record Number of Ransomware Victims and Groups in 2025
Searchlight Cyber reports a 30% annual increase in ransomware victim numbers in 2025 First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/record-number-ransomware-victims/
-
Japan’s Washington Hotel Reports Ransomware Attack
Washington Hotel, located in Japan, confirmed a ransomware attack on internal servers and is investigating the extent of the incident. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/japans-washington-hotel-reports-ransomware-attack/
-
Kettering Health Notifying Patients of Interlock Breach
Cybercrime Group First Listed Ohio Health System as a Data Theft Victim Last June. Ohio-based Kettering Health is notifying current and former patients and affiliates that their personal, health and financial information was potentially compromised in a May 2025 ransomware attack and data theft incident claimed by cybercriminal gang Interlock. First seen on govinfosecurity.com Jump…
-
Polish police detain alleged cybercriminal with Phobos ransomware ties
A 47-year-old man was arrested by Polish police for his alleged involvement with the Phobos ransomware operation. First seen on therecord.media Jump to article: therecord.media/poland-phobos-ransomware-arrest
-
Polish authorities arrest alleged Phobos ransomware affiliate
The 47-year-old man, who was not identified, faces up to five years in prison for producing, obtaining and sharing computer programs used to conduct cyberattacks. First seen on cyberscoop.com Jump to article: cyberscoop.com/phobos-ransomware-affiliate-arrested-poland/
-
Data Minimization Is Still an Underrated Security Control
Why Reducing Data Volume Matters More Than Ever for SOCs and CISOs Data minimization is often perceived as a constraint on innovation. In reality, it is the ultimate enabler of resilience. It reduces the impact of breaches, weakens ransomware leverage, improves SOC efficiency and secures the AI frontier. First seen on govinfosecurity.com Jump to article:…
-
Why Healthcare Became Ransomware’s Favorite Target: A $4.4M Lesson Every CISO Needs
3 million patients couldn’t access healthcare after PIH Health’s ransomware attack. Here’s why hospitals are ransomware’s favorite target”, and what changes. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/why-healthcare-became-ransomwares-favorite-target-a-4-4m-lesson-every-ciso-needs/
-
Data-only extortion grows as ransomware gangs seek better profits
Businesses should prioritize securing one type of technology in particular, the security firm Arctic Wolf said in a new report. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/ransomware-extortion-bec-arctic-wolf/812321/
-
Polish cybercrime Police arrest man linked to Phobos ransomware operation
Officers from Poland’s Central Bureau of Cybercrime Control (CBZC) police arrested a 47-year-old man linked to the Phobos ransomware operation. Polish authorities arrested a 47-year-old man suspected of involvement in cybercrime and linked him to the Phobos ransomware operation. Police said they discovered evidence of illegal activities on his seized devices. >>Officers from the Central…
-
Polish cops nab 47-year-old man in Phobos ransomware raid
Police say seized kit contained logins, passwords, and server IP addresses First seen on theregister.com Jump to article: www.theregister.com/2026/02/17/poland_phobos_ransomware_arrest/
-
Significant Rise in Ransomware Attacks Targeting Industrial Operations
Dragos annual report warns of a surge in ransomware attacks causing increased operational disruption in industrial environments First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/rise-in-ransomware-targeting/
-
Poland arrests suspect linked to Phobos ransomware operation
Polish police have detained a 47-year-old man suspected of ties to the Phobos ransomware group and seized computers and mobile phones containing stolen credentials, credit card numbers, and server access data. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/poland-arrests-suspect-linked-to-phobos-ransomware-operation/
-
Phobos ransomware affiliate arrested in Poland
Officers from Poland’s Central Bureau for Combating Cybercrime (CBZC) detained a 47-year-old man suspected of creating, acquiring, and sharing computer programs used to … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/17/phobos-ransomware-affiliate-arrested-in-poland/
-
0APT Ransomware Group Claims 200 Victims, Fails to Provide Proof
A new ransomware-as-a-service (RaaS) outfit calling itself 0APT has quickly drawn attention for all the wrong reasons, after loudly claiming to have compromised around 200 victims while failing to provide any verifiable proof of compromise. Emerging on or around January 28, 2026, the group launched a dark web data leak site (DLS) and rapidly populated it with…
-
Washington Hotel in Japan discloses ransomware infection incident
The Washington Hotel brand in Japan has announced that that its servers were compromised in a ransomware attack, exposing various business data. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/washington-hotel-in-japan-discloses-ransomware-infection-incident/

