Ransomware
-
Discover the new Gunra ransomware targeting Windows systems, encrypting files, and deleting shadow copies. Learn about its origins, tactics, and how organizations can defend against this emerging threat.
-
Novabev Group confirmed a ransomware attack on July 14, 2025, disrupting operations and IT infrastructure. The company refuses to pay ransom and assures customer data remains secure.
-
Discover how a new PowerShell-based ransomware variant exploits GitHub for distribution. Learn about its infection method, encryption process, and the risks it poses to users.
-
A ransomware attack has disrupted operations at a Lucknow advertising firm, compromising vital data and leading to an investigation by cybercrime authorities. Learn more about the incident and its implications.
-
Discover how the VexTrio scam network exploits WordPress sites to distribute malware and fraudulent schemes. Learn about the tactics used and the impact on global cybersecurity.
-
Posted: June 11, 2025Views: 27FIN6 cybercrime group uses fake resumes hosted on AWS to deliver More_eggs malware via LinkedIn. Learn how they target recruiters and evade detection.
-
Posted: June 10, 2025Views: 31Discover how a China-linked cyber espionage group, including APT15 and UNC5174, targeted over 70 organizations across government, media, and other sectors. Learn about the malware used, including ShadowPad and GoReShell, and the exploited vulnerabilities.
-
Posted: June 10, 2025Views: 23Learn about the ransomware attack on Sensata Technologies, a leading industrial tech firm. Discover how the breach impacted operations, compromised customer data, and the company's response, including credit monitoring for affected individuals.
-
Cybersecurity experts reveal a significant supply chain attack affecting npm and PyPI ecosystems, compromising numerous packages and exposing millions of users to malware. Learn about the affected packages and how to protect yourself.
-
Cybercriminals have devised an alarming new tactic by hiding malware in Google Calendar invites using invisible Unicode characters. This stealthy technique enables the delivery of malicious payloads through trusted platforms—bypassing traditional security mechanisms with a single deceptive character.