Tag: ransomware
-
Pennsylvania attorney general says SSNs stolen during August ransomware attack
Social Security numbers and medical information were among the data stolen in an August breach of the networks of Pennsylvania’s attorney general, officials said. First seen on therecord.media Jump to article: therecord.media/pennsylvania-attorney-general-office-data-breach-ssns
-
Yurei Ransomware: Encryption Mechanics, Operational Model, and Data Exfiltration Methods
A newly identified ransomware group, Yurei, has emerged as a significant threat to organizations worldwide, with confirmed attacks targeting entities in Sri Lanka and Nigeria across multiple critical industries. First publicly identified in early September 2025, Yurei operates a traditional ransomware-as-extortion model, infiltrating corporate networks, encrypting sensitive data, destroying backup systems, and leveraging a dedicated…
-
Everest Ransomware Says It Stole Data of Millions of Under Armour Users
Everest ransomware claims to have breached Under Armour, stealing 343GB of data, including customer info, product records, and internal company files. First seen on hackread.com Jump to article: hackread.com/everest-ransomware-under-armour-users-data/
-
Everest Ransomware Says It Stole Data of Millions of Under Armour Users
Everest ransomware claims to have breached Under Armour, stealing 343GB of data, including customer info, product records, and internal company files. First seen on hackread.com Jump to article: hackread.com/everest-ransomware-under-armour-users-data/
-
Kraken Uses Benchmarking to Enhance Ransomware Attacks
Cisco Talos has observed overlaps between Kraken and the earlier HelloKitty cartel through attack tactics using SMB flaws for big-game hunting and double extortion First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/kraken-benchmarking-enhance/
-
Akira engaged in ransomware attacks against critical sectors
The group has stepped up threat activity by abusing edge devices and other tools, reaping hundreds of millions of dollars in illicit gains. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/akira-ransomware-critical-sectors-fbi-cisa/805508/
-
Pennsylvania AG confirms data breach after INC Ransom attack
The office of Pennsylvania’s attorney general has confirmed that the ransomware gang behind an August 2025 cyberattack stole files containing personal and medical information. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/pennsylvania-ag-confirms-data-breach-after-inc-ransom-attack/
-
Über 500 neue Opfer von Ransomware pro Monat
Check Point Software Technologies hat seinen Ransomware Report für Q3 2025 veröffentlicht. Von Juli bis September 2025 beobachteten die Sicherheitsforscher mehr als 85 aktive Data-Leak-Seiten (DLS), die zusammen 1.592 neue Opfer listeten. Im Vergleich zu den 1.607 Opfern, die im zweiten Quartal 2025 gemeldet wurden, blieb die Veröffentlichungsrate konstant. Sie liegt jedoch immer noch deutlich…
-
Akira ransomware expands to Nutanix AHV, raising stakes for enterprise security
Tags: access, attack, backup, breach, business, cisco, data, detection, endpoint, exploit, firewall, infrastructure, leak, mfa, monitoring, network, ransomware, resilience, strategy, threat, update, veeam, vpn, vulnerability, windowsThreat that thrives in enterprise blind spots: Experts indicate that Akira leverages the blind spots that enterprises acknowledge but rarely fix. Of the blind spots, remote access tops the list, followed by patching.”Akira wins not because it has reinvented ransomware, but because it has perfected the parts enterprises fail to take seriously. It exploits the…
-
Akira ransomware expands to Nutanix AHV, raising stakes for enterprise security
Tags: access, attack, backup, breach, business, cisco, data, detection, endpoint, exploit, firewall, infrastructure, leak, mfa, monitoring, network, ransomware, resilience, strategy, threat, update, veeam, vpn, vulnerability, windowsThreat that thrives in enterprise blind spots: Experts indicate that Akira leverages the blind spots that enterprises acknowledge but rarely fix. Of the blind spots, remote access tops the list, followed by patching.”Akira wins not because it has reinvented ransomware, but because it has perfected the parts enterprises fail to take seriously. It exploits the…
-
Check Point veröffentlicht Ransomware Report für Q3 2025
Deutschland war in Q3 das bevorzugte Ziel der Gruppen Safepay und DragonForce; Ransomware-Gruppen formieren sich nach erfolgreichen Takedown-Operationen der Strafverfolgungsbehörden neu First seen on infopoint-security.de Jump to article: www.infopoint-security.de/check-point-veroeffentlicht-ransomware-report-fuer-q3-2025/a42855/
-
Cyber-Attack Costs Carmaker JLR $258m in Q2
Carmaker JLR has posted $639m Q2 losses and a one-off $258m hit after a major ransomware attack First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/jlr-posts-639m-q2-losses/
-
Widerstandsfähigkeit für SaaS-Umgebungen Backup als strategischer Resilienzfaktor
Die Zahl der globalen Ransomware-Opfer ist um 70 Prozent gestiegen und 80 Prozent der Unternehmen waren in den letzten zwölf Monaten von mindestens einem Ransomware-Angriff betroffen. Social Engineering/BEC-Angriffe stiegen von 20 Prozent auf 25,6 Prozent im Vergleichszeitraum Januar-Mai 2025 zu 2024. Gleichzeitig werden SaaS-Plattformen zu immer attraktiveren Zielen für Cyberkriminelle, da sie in fast allen……
-
Widerstandsfähigkeit für SaaS-Umgebungen Backup als strategischer Resilienzfaktor
Die Zahl der globalen Ransomware-Opfer ist um 70 Prozent gestiegen und 80 Prozent der Unternehmen waren in den letzten zwölf Monaten von mindestens einem Ransomware-Angriff betroffen. Social Engineering/BEC-Angriffe stiegen von 20 Prozent auf 25,6 Prozent im Vergleichszeitraum Januar-Mai 2025 zu 2024. Gleichzeitig werden SaaS-Plattformen zu immer attraktiveren Zielen für Cyberkriminelle, da sie in fast allen……
-
Widerstandsfähigkeit für SaaS-Umgebungen Backup als strategischen Resilienzfaktor
Die Zahl der globalen Ransomware-Opfer ist um 70 Prozent gestiegen und 80 Prozent der Unternehmen waren in den letzten zwölf Monaten von mindestens einem Ransomware-Angriff betroffen. Social Engineering/BEC-Angriffe stiegen von 20 Prozent auf 25,6 Prozent im Vergleichszeitraum Januar-Mai 2025 zu 2024. Gleichzeitig werden SaaS-Plattformen zu immer attraktiveren Zielen für Cyberkriminelle, da sie in fast allen……
-
Kunden- und Mitarbeiterdaten von Logitech gehackt
Der Zubehörhersteller Logitech hat ein Datenleck eingeräumt. Der Angriff erfolgte wohl über Oracle-Software. First seen on golem.de Jump to article: www.golem.de/news/ransomware-kunden-und-mitarbeiterdaten-von-logitech-gehackt-2511-202224.html
-
TXOne Bedrohungsanalyse 1H 2025: Ransomware dominiert OT-Angriffe
Der Fertigungssektor war Anfang 2025 der größten Bedrohung durch die Clop-Ransomware ausgesetzt, die auch in der ersten Jahreshälfte die aktivste Ransomware-Familie war. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/txone-bedrohungsanalyse-1h-2025-ransomware-dominiert-ot-angriffe/a42838/
-
Conduent Faces Financial Hit, Lawsuits from Breach Affecting 10.5 Million
The intrusion a year ago into Conduent Business Solutions’ systems, likely by the SafePay ransomware group, that affected more than 10.5 individuals will likely cost the company more than $50 million in related expenses and millions more to settle the lawsuits that are piling up. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/11/conduent-faces-financial-hit-lawsuits-from-breach-affecting-10-5-million/
-
Conduent Faces Financial Hit, Lawsuits from Breach Affecting 10.5 Million
The intrusion a year ago into Conduent Business Solutions’ systems, likely by the SafePay ransomware group, that affected more than 10.5 individuals will likely cost the company more than $50 million in related expenses and millions more to settle the lawsuits that are piling up. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/11/conduent-faces-financial-hit-lawsuits-from-breach-affecting-10-5-million/
-
Cl0p claims ransomware hit on NHS
Tags: ransomwareRansomware gangsters claim to have attacked the NHS but clarity on the nature of the incident is yet to emerge. First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366634578/Cl0p-claims-ransomware-hit-on-NHS
-
Akira RaaS Targets Nutanix VMs, Threatens Critical Orgs
The Akira ransomware group has been experimenting with new tools, bugs, and attack surfaces, with demonstrated success in significant sectors. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/akira-raas-nutanix-vms-critical-orgs
-
Cybersecurity Snapshot: Refresh Your Akira Defenses Now, CISA Says, as OWASP Revamps Its App Sec Top 10 Risks
Tags: access, advisory, ai, antivirus, application-security, attack, authentication, backup, business, chatgpt, cisa, ciso, cloud, compliance, control, corporate, cve, cyber, cybersecurity, data, defense, detection, encryption, endpoint, exploit, finance, firewall, flaw, framework, germany, group, guide, healthcare, infrastructure, injection, Internet, iot, law, malware, mfa, mitigation, phishing, privacy, programming, ransomware, resilience, risk, service, soc, software, supply-chain, tactics, technology, threat, tool, update, vulnerabilityLearn why you should revise your Akira ransomware protection plans. Plus, find out what’s new in OWASP’s revamped Top 10 Web Application Risks list. Also, find out about agentic AI’s cognitive degradation risk. And get the latest on AI security trends and CISO compensation. Key takeaways CISA and other agencies are urging organizations, especially in…
-
Cybersecurity Snapshot: Refresh Your Akira Defenses Now, CISA Says, as OWASP Revamps Its App Sec Top 10 Risks
Tags: access, advisory, ai, antivirus, application-security, attack, authentication, backup, business, chatgpt, cisa, ciso, cloud, compliance, control, corporate, cve, cyber, cybersecurity, data, defense, detection, encryption, endpoint, exploit, finance, firewall, flaw, framework, germany, group, guide, healthcare, infrastructure, injection, Internet, iot, law, malware, mfa, mitigation, phishing, privacy, programming, ransomware, resilience, risk, service, soc, software, supply-chain, tactics, technology, threat, tool, update, vulnerabilityLearn why you should revise your Akira ransomware protection plans. Plus, find out what’s new in OWASP’s revamped Top 10 Web Application Risks list. Also, find out about agentic AI’s cognitive degradation risk. And get the latest on AI security trends and CISO compensation. Key takeaways CISA and other agencies are urging organizations, especially in…
-
CISA flags imminent threat as Akira ransomware starts hitting Nutanix AHV
Advisory updated as leading cybercrime crew opens up its target pool First seen on theregister.com Jump to article: www.theregister.com/2025/11/14/cisa_akira_ransomware/
-
Kraken Ransomware Targets Windows, Linux, and VMware ESXi in Enterprise Environments
Cisco Talos has identified an emerging threat from Kraken, a sophisticated cross-platform ransomware group that has emerged from the remnants of the HelloKitty ransomware cartel. In August 2025, the security firm observed the Russian-speaking group conducting big-game hunting and double-extortion attacks against enterprise environments worldwide. Kraken represents a significant evolution in ransomware threats due to…
-
Ransomware’s Fragmentation Reaches a Breaking Point While LockBit Returns
Key Takeaways:85 active ransomware and extortion groups observed in Q3 2025, reflecting the most decentralized ransomware ecosystem to date.1,590 victims disclosed across 85 leak sites, showing high, sustained activity despite law-enforcement pressure.14 new ransomware brands launched this quarter, proving how quickly affiliates reconstitute after takedowns.LockBit’s reappearance with First seen on thehackernews.com Jump to article: thehackernews.com/2025/11/ransomwares-fragmentation-reaches.html
-
Akira Ransomware Haul Surpasses $244M in Illicit Proceeds
Akira ransomware has extorted $244M since September 2025, with some attacks exfiltrating data in just two hours, a joint cybersecurity advisory warns First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/akira-ransomware-244m-in-illicit/
-
Kraken Ransomware Targets Windows, Linux, and VMware ESXi in Enterprise Environments
Cisco Talos has identified an emerging threat from Kraken, a sophisticated cross-platform ransomware group that has emerged from the remnants of the HelloKitty ransomware cartel. In August 2025, the security firm observed the Russian-speaking group conducting big-game hunting and double-extortion attacks against enterprise environments worldwide. Kraken represents a significant evolution in ransomware threats due to…
-
Ransomware’s Fragmentation Reaches a Breaking Point While LockBit Returns
Key Takeaways:85 active ransomware and extortion groups observed in Q3 2025, reflecting the most decentralized ransomware ecosystem to date.1,590 victims disclosed across 85 leak sites, showing high, sustained activity despite law-enforcement pressure.14 new ransomware brands launched this quarter, proving how quickly affiliates reconstitute after takedowns.LockBit’s reappearance with First seen on thehackernews.com Jump to article: thehackernews.com/2025/11/ransomwares-fragmentation-reaches.html
-
CISA Warns: Akira Ransomware Has Extracted $42M After Targeting Hundreds
A newly updated cybersecurity advisory from federal agencies reveals that the Akira ransomware operation has significantly escalated its campaign, compromising organizations worldwide and accumulating massive ransom proceeds through sophisticated attack methods. According to the joint advisory released on November 13, 2025, by the FBI, CISA, Department of Defense Cyber Crime Center (DC3), Department of Health…

