Ransomware
-
The FBI, CISA, and MS-ISAC have issued a critical alert about Medusa ransomware, a highly destructive cyber threat that is targeting key industries worldwide. With over 300 victims across healthcare, education, law, insurance, and manufacturing, Medusa ransomware is rapidly expanding its reach, using sophisticated tactics to extort businesses.
-
A new ransomware strain called Ebyte is rapidly spreading across North America and Europe, encrypting critical files and demanding high ransom payments. Security experts warn that this malware is highly advanced, making data recovery nearly impossible without paying the attackers.
-
Cybercriminals have found a new way to trick companies into paying fake ransoms – by sending physical letters in the mail. Instead of hacking networks or deploying ransomware, fraudsters are simply claiming they have stolen sensitive data and demanding money to prevent its release.
-
A new cyberattack campaign is tricking users into downloading malware through fake browser update alerts. Hackers from the SmartApeSG group are targeting compromised websites to distribute NetSupport RAT and StealC malware, which can steal sensitive data and give attackers remote access to your system.
-
The New York Blood Center Enterprises suffered a ransomware attack on January 26, 2025, forcing it to cancel blood donation drives despite an ongoing blood shortage. The organization is working with cybersecurity experts and law enforcement to restore its systems, but processing times are delayed, and the timeline for full recovery is unknown.
-
The WantToCry ransomware group is targeting unsecured SMB services, encrypting shared files, and demanding ransom payments. Weak passwords and misconfigured networks allow these attacks to succeed. Organizations must secure their SMB settings to prevent data loss and ransomware infections.
-
Hackers are using SSH tunnels to secretly access VMware ESXi servers, steal data, and deploy ransomware. These servers, which host multiple virtual machines, are critical to businesses but are often not well-monitored. Attackers take advantage of these gaps to lock down systems and demand ransom payments.
-
Cybercriminals are pretending to be IT support using Microsoft Teams to trick employees. They use spam emails, fake calls, and phishing tactics to gain access to company systems and install ransomware.
-
A dangerous ransomware called Codefinger is attacking Amazon Web Services (AWS) users by encrypting their data in S3 buckets. Victims cannot recover their files without paying for a decryption key, making this attack a significant threat to cloud-based systems.
-
PowerSchool, a leading education software provider, experienced a cyberattack that exposed sensitive data about students and teachers. This incident emphasizes the urgent need for robust cybersecurity measures in educational institutions.