Ransomware
-
Cybercriminals have devised an alarming new tactic by hiding malware in Google Calendar invites using invisible Unicode characters. This stealthy technique enables the delivery of malicious payloads through trusted platforms—bypassing traditional security mechanisms with a single deceptive character.
-
Marks & Spencer (M&S), one of the UK’s most trusted retail brands, has confirmed a significant cybersecurity breach following a ransomware attack that has disrupted its operations since Easter weekend. The attack, attributed to the DragonForce ransomware group, resulted in the theft of personal information belonging to millions of customers and has caused widespread outages across its digital infrastructure.
-
Cybercriminals are now leveraging steganography to hide ransomware in ordinary JPG image files, deploying Fully Undetectable (FUD) malware that bypasses traditional security solutions. These advanced tactics exploit metadata and pixel data to deliver multi-stage attacks — silently and effectively.
-
Ascension, one of the largest private healthcare providers in the U.S., has confirmed a significant data breach affecting 437,329 patients, linked to a former business partner’s software vulnerability. This marks yet another serious blow to the healthcare sector’s cybersecurity posture, coming less than a year after Ascension's systems were crippled by ransomware.
-
In a recent high-impact ransomware incident, a reputed biopharmaceutical company in Pune’s Hinjawadi IT hub has fallen victim to a crippling cyberattack. The attackers have demanded a ransom of $80,000 (₹68 lakh) in exchange for unlocking sensitive encrypted data, effectively halting the firm's operations for over 48 hours.
-
A newly surfaced ransomware group, RansomHub, is aggressively targeting corporate environments using an advanced, multi-stage infection chain that combines initial access malware with strategic network infiltration tactics. Cybersecurity researchers warn that this Ransomware-as-a-Service (RaaS) group poses a serious threat to global organizations by leveraging deceptive update prompts and stealthy backdoors.
-
Data poisoning is the new and silent evolution of ransomware that doesn’t lock your files — it changes them. From financial fraud to medical disasters, this dangerous cyberattack is designed to manipulate critical data, leaving businesses, hospitals, and governments confused, vulnerable, and unprepared.
-
Cybercriminals have devised a new social engineering attack known as ClickFix, which abuses fake CAPTCHA verifications to trick users into installing malware, including ransomware and banking trojans like Qakbot. This attack exploits users’ trust in CAPTCHA systems, leading them to unknowingly execute malicious commands.
-
A new ransomware strain named VanHelsing is actively targeting Windows systems, using advanced encryption and evasion techniques to bypass security defenses. First discovered on March 16, 2025, this ransomware is particularly affecting government, manufacturing, and pharmaceutical industries in France and the United States.
-
The Babuk2 ransomware group has been caught making false extortion demands by recycling stolen data from past cyberattacks. Instead of launching new breaches, Babuk2 is repurposing data from older incidents and pressuring victims into paying ransoms for information that has already been leaked.