Tag: ransomware
-
Two cybersecurity pros get prison time for helping ransomware gang
Two American cybersecurity professionals were sentenced to four years in prison for facilitating BlackCat ransomware attacks in 2023. They pleaded guilty in December 2025 to … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/05/04/cybersecurity-experts-alphv-blackcat-ransomware-sentenced/
-
DOJ Sentences Two Americans for ALPHV BlackCat Ransomware Attacks
The U.S. Department of Justice (DOJ) has sentenced two American cybersecurity professionals to prison for their involvement in ALPHV BlackCat ransomware attacks that targeted multiple U.S. organizations in 2023. The case highlights the growing threat of insider expertise being misused in ransomware-as-a-service (RaaS) operations. Ryan Goldberg, 40, from Georgia, and Kevin Martin, 36, from Texas,…
-
cPanel-Lücke: Hacker kapern massenhaft Webportale und schleusen Ransomware ein
Für Webdienstbetreiber wird es höchste Zeit, ihre cPanel-Instanzen zu patchen. Angreifer nutzen eine kritische Lücke für Ransomware-Attacken aus. First seen on golem.de Jump to article: www.golem.de/news/cpanel-luecke-hacker-kapern-massenhaft-webportale-und-fordern-loesegeld-2605-208263.html
-
cPanel-Lücke: Hacker kapern massenhaft Webportale und fordern Lösegeld
Für Webdienstbetreiber wird es höchste Zeit, ihre cPanel-Instanzen zu untersuchen. Angreifer schleusen durch eine kritische Lücke Ransomware ein. First seen on golem.de Jump to article: www.golem.de/news/cpanel-luecke-hacker-kapern-massenhaft-webportale-und-fordern-loesegeld-2605-208263.html
-
Paying Ransom Won’t Help as VECT 2.0 Ransomware Destroys Data Irreversibly
VECT 2.0 ransomware contains fatal flaws that permanently destroy files, making recovery impossible and rendering ransom payments useless for victims worldwide. First seen on hackread.com Jump to article: hackread.com/paying-ransom-vect-2-0-ransomware-destroys-data/
-
Security Affairs newsletter Round 575 by Pierluigi Paganini INTERNATIONAL EDITION
A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. Two US cybersecurity experts sentenced in ransomware case, third awaits July ruling Trellix discloses the breach…
-
Global Cyber Threat Brief: Identity Breaches, Supply Chain Attacks, and the Rise of Organized Cybercrime
Tags: attack, breach, cyber, cybercrime, data, exploit, identity, organized, ransomware, service, supply-chain, threatIn the past week, the global cyber threat landscape has once again demonstrated how rapidly attackers are evolving shifting from isolated intrusions to coordinated, multi-stage campaigns targeting identities, supply chains, and service providers. From large-scale identity data exposure to sophisticated token abuse and ransomware-driven disruptions, these incidents highlight a critical reality: attackers are increasingly exploiting…
-
2 US Cybersecurity Experts Jailed for Aiding ALPHV (BlackCat) Ransomware
Two US cybersecurity experts jailed for aiding BlackCat ransomware group, extorting victims worldwide and exploiting insider access for profit. First seen on hackread.com Jump to article: hackread.com/us-cybersecurity-experts-jail-alphv-blackcat-ransomware/
-
Two US cybersecurity experts sentenced in ransomware case, third awaits July ruling
Two US security experts were sentenced to 4 years for helping ransomware attacks. A third accomplice pleaded guilty and awaits sentencing. Two US cybersecurity professionals, Ryan Goldberg and Kevin Martin, were sentenced to four years in prison for their role in supporting ransomware attacks. Both pleaded guilty to conspiracy involving extortion. A third individual, Angelo…
-
Critrical cPanel flaw mass-exploited in “Sorry” ransomware attacks
A new disclosed cPanel flaw tracked as CVE-2026-41940 is being mass-exploited to breach websites and encrypt data in “Sorry” ransomware attacks. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/critrical-cpanel-flaw-mass-exploited-in-sorry-ransomware-attacks/
-
Cyber incident responders who carried out ransomware attacks given 4-year sentences
Two cybersecurity incident responders who abused their positions to carry out covert ransomware attacks were sentenced to four years in prison. First seen on therecord.media Jump to article: therecord.media/ransomware-cyber-incident-responders
-
First reports come in of victims of critical cPanel vuln as ‘millions’ of sites potentially exposed
Exploitation was underway before patches landed, at least one victim reports ransomware demand First seen on theregister.com Jump to article: www.theregister.com/2026/05/01/critical_cpanel_vuln_hits_cisa/
-
Two American Cybersecurity Workers Jailed for BlackCat Ransomware Attacks
The cybersecurity workers used their knowledge and skills to conduct ransomware attacks for notorious gang, rather than protect victims against them First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/cybersecurity-workers-jailed/
-
Two American Cybersecurity Workers Jailed for BlackCat Ransomware Attacks
The cybersecurity workers used their knowledge and skills to conduct ransomware attacks for notorious gang, rather than protect victims against them First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/cybersecurity-workers-jailed/
-
Two Cybersecurity Professionals Get 4-Year Sentences in BlackCat Ransomware Attacks
The U.S. Department of Justice (DoJ) on Thursday announced the sentencing of two cybersecurity professionals to four years each in prison for their role in facilitating BlackCat ransomware attacks in 2023.Ryan Goldberg, 40, of Georgia, and Kevin Martin, 36, of Texas, were accused of deploying the ransomware against multiple victims located throughout the U.S. between…
-
US ransomware negotiators get 4 years in prison over BlackCat attacks
Two former employees of cybersecurity incident response companies Sygnia and DigitalMint were sentenced to four years in prison each for targeting U.S. companies in BlackCat (ALPHV) ransomware attacks. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/us-ransomware-negotiators-get-4-years-in-prison-over-blackcat-attacks/
-
AI-Powered Ransomware Surge Hits 7,831 Victims Worldwide
Ransomware attacks surged dramatically in 2025, with global victims reaching 7,831. The sharp rise highlights how cybercrime has evolved into a highly organized, AI-driven ecosystem in which attackers operate at speed, with automation and scale. This surge is largely fueled by the widespread availability of AI-powered cybercrime tools such as WormGPT, FraudGPT, and BruteForceAI, which…
-
Former incident responders sentenced to 4 years in prison for committing ransomware attacks
Ryan Goldberg and Kevin Martin attacked five companies in 2023 and extorted nearly $1.3 million from one of their victims. First seen on cyberscoop.com Jump to article: cyberscoop.com/incident-responders-ryan-goldberg-kevin-martin-sentenced-ransomware/
-
Are Hospital Attacks ‘Terrorism,’ Patient Deaths ‘Murder’?
Experts Weigh How the US Could Raise the Stakes for Would-Be Attackers. As ransomware attacks on hospitals continue to disrupt patient care and sometimes contribute to serious patient harm, policymakers are increasingly debating whether the U.S. should treat such incidents as acts of terrorism – and even pursue homicide charges when a patient death occurs.…
-
Copy Fail (CVE-2026-31431): Frequently asked questions about Linux kernel privilege escalation vulnerability
Tags: access, ai, attack, browser, cisa, cloud, container, crypto, cve, cybersecurity, data, exploit, flaw, infrastructure, kev, linux, mitigation, ransomware, risk, tool, update, vulnerabilityA flaw in the Linux kernel present since 2017 allows a local user to gain root access on virtually every major Linux distribution. A public exploit is available and reported to work reliably. Key Takeaways CVE-2026-31431 is a high severity local privilege escalation vulnerability in the Linux kernel reportedly affecting virtually every major distribution released…
-
Ransomware Victims up 389%, TTE in Less Than Two Days: How Can Defenders Stay Ahead?
Agentic AI’s impact on ransomware”, it’s execution, its success and even who gets to play, is being widely felt. And we’re just getting started. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/ransomware-victims-up-389-tte-in-less-than-two-days-how-can-defenders-stay-ahead/
-
Ransomware Attacks on Schools: 4 Warning Signs IT Teams Shouldn’t Ignore
Ransomware attacks are increasingly threatening to K12 schools, with districts of all sizes becoming prime targets for cybercriminals. These school ransomware attacks don’t just impact IT systems. They can shut down classrooms, disrupt learning for days or even weeks, and expose sensitive student and staff data. The financial and operational costs of recovery can be…
-
VECT Ransomware: Warum die Zahlung des Lösegelds technisch zwecklos ist
Tags: ransomwareDie VECT-Ransomware zerstört Dateien über 128 KB dauerhaft. Wer zahlt, verliert Geld und Daten. Eine Rettung ist technisch unmöglich. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/vect-ransomware-loesegeld
-
VECT Ransomware: Warum die Zahlung des Lösegelds technisch zwecklos ist
Tags: ransomwareDie VECT-Ransomware zerstört Dateien über 128 KB dauerhaft. Wer zahlt, verliert Geld und Daten. Eine Rettung ist technisch unmöglich. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/vect-ransomware-loesegeld
-
Dutch Health Tech Firm ChipSoft Confirms Destruction of Stolen Patient Data
The Cyber Express previously reported the ChipSoft cyberattack, in which ransomware actors stole patient data. Now, reports have surfaced from the Dutch medical software provider, noting that the compromised data has been destroyed, though key details about the incident remain undisclosed. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/chipsoft-cyberattack-stolen-data-destroyed/
-
Ransomware-Hotspot: Deutschland als Top-Ziel für Erpresser
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/ransomware-hotspot-deutschland-top-ziel-erpresser
-
Vect 2.0 Ransomware Acts as Wiper, Thanks to Design Error
The emerging ransomware has been deployed against victims of the TeamPCP supply chain attacks, but organizations should think twice before paying for a decryptor. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/vect-ransomware-wiper-design-error
-
Buggy Vect ransomware is effectively a data wiper, researchers find
Due to a bug in the ransomware, affiliates of the Vect Ransomware-as-a-Service operation are irretrievably encrypting victims’ data. >>Victims who pay the ransom … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/04/29/vect-ransomware-bug/
-
Critical Flaw Turns Vect Ransomware into Data Destroying Wiper
The Vect 2.0 ransomware wipes large files instead of merely encrypting them, making recovery impossible even for the attackers First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/critical-flaw-vect-ransomware-data/
-
Critical Flaw Turns Vect Ransomware into Data Destroying Wiper
The Vect 2.0 ransomware wipes large files instead of merely encrypting them, making recovery impossible even for the attackers First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/critical-flaw-vect-ransomware-data/

