Ransomware
-
Data poisoning is the new and silent evolution of ransomware that doesn’t lock your files — it changes them. From financial fraud to medical disasters, this dangerous cyberattack is designed to manipulate critical data, leaving businesses, hospitals, and governments confused, vulnerable, and unprepared.
-
Cybercriminals have devised a new social engineering attack known as ClickFix, which abuses fake CAPTCHA verifications to trick users into installing malware, including ransomware and banking trojans like Qakbot. This attack exploits users’ trust in CAPTCHA systems, leading them to unknowingly execute malicious commands.
-
A new ransomware strain named VanHelsing is actively targeting Windows systems, using advanced encryption and evasion techniques to bypass security defenses. First discovered on March 16, 2025, this ransomware is particularly affecting government, manufacturing, and pharmaceutical industries in France and the United States.
-
The Babuk2 ransomware group has been caught making false extortion demands by recycling stolen data from past cyberattacks. Instead of launching new breaches, Babuk2 is repurposing data from older incidents and pressuring victims into paying ransoms for information that has already been leaked.
-
The FBI, CISA, and MS-ISAC have issued a critical alert about Medusa ransomware, a highly destructive cyber threat that is targeting key industries worldwide. With over 300 victims across healthcare, education, law, insurance, and manufacturing, Medusa ransomware is rapidly expanding its reach, using sophisticated tactics to extort businesses.
-
A new ransomware strain called Ebyte is rapidly spreading across North America and Europe, encrypting critical files and demanding high ransom payments. Security experts warn that this malware is highly advanced, making data recovery nearly impossible without paying the attackers.
-
Cybercriminals have found a new way to trick companies into paying fake ransoms – by sending physical letters in the mail. Instead of hacking networks or deploying ransomware, fraudsters are simply claiming they have stolen sensitive data and demanding money to prevent its release.
-
A new cyberattack campaign is tricking users into downloading malware through fake browser update alerts. Hackers from the SmartApeSG group are targeting compromised websites to distribute NetSupport RAT and StealC malware, which can steal sensitive data and give attackers remote access to your system.
-
The New York Blood Center Enterprises suffered a ransomware attack on January 26, 2025, forcing it to cancel blood donation drives despite an ongoing blood shortage. The organization is working with cybersecurity experts and law enforcement to restore its systems, but processing times are delayed, and the timeline for full recovery is unknown.
-
The WantToCry ransomware group is targeting unsecured SMB services, encrypting shared files, and demanding ransom payments. Weak passwords and misconfigured networks allow these attacks to succeed. Organizations must secure their SMB settings to prevent data loss and ransomware infections.