FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Ransomware

20 articles

SC Media Ransomware 19h ago

Accelerated Akira ransomware intrusions examined

CyberScoop reports that increasingly efficient techniques have significantly reduced the Akira ransomware operation's attack times.

SC Media →

BleepingComputer Ransomware 1d ago

Evolution of Ransomware: Multi-Extortion Ransomware Attacks

Multi-extortion ransomware relies on stolen data to pressure victims with public leaks. Penta Security explains how its D.

T1041

BleepingComputer →

GBHackers Ransomware 1d ago

Phorpiex Botnet Fuels Ransomware, Sextortion, and Crypto-Theft Attacks

Hackers are abusing the long-running Phorpiex (Trik) botnet to run large-scale ransomware, sextortion, and crypto-clipping operations, turning one infrastruc...

GBHackers →

SC Media Ransomware 1d ago

Ransomware intrusion compromises North Dakota water treatment facility

North Dakota's Minot Water Treatment Plant, which serves roughly 80,000 people in Minot and surrounding communities, had its SCADA system impacted by a ranso...

SC Media →

SC Media Ransomware 1d ago

Third-party hack affirmed by Nissan after Everest ransomware assertions

Major Japanese multinational automaker Nissan has confirmed having its data compromised in a cyberattack against a third-party vendor earlier this year after...

SC Media →

SC Media Ransomware 1d ago

Ransomware attackers increasingly exploit legitimate IT tools, bypassing antivirus

Attackers are leveraging tools like Process Hacker and IOBit Unlocker, which possess deep operating system access.

SC Media →

SC Media Ransomware 1d ago

Hasbro confirms cyberattack, expects weeks-long resolution

The specific type of cyberattack, such as ransomware, has not been disclosed by Hasbro.

SC Media →

Cyberscoop Ransomware 1d ago

Akira ransomware group can achieve initial access to data encryption in less than an hour

A new report from Halcyon finds that the group also puts more effort than usual into developing working decryptors, likely to incentivize businesses to pay u...

Cyberscoop →

Help Net Security Ransomware Google Apple 2d ago

Software supply chain hacks trigger wave of intrusions, data theft

After linking the Axios npm supply chain attack to North Korean hackers, Google researchers warned that “hundreds of thousands of stolen secrets could potent...

T1041 T1195

Help Net Security →

GBHackers Ransomware Microsoft 2d ago

Akira-Style Ransomware Campaign Hits Windows Users Across South America

A newly identified ransomware campaign is targeting Windows users across South America, leveraging tactics that closely mimic the notorious Akira ransomware ...

GBHackers →

Infosecurity Magazine Ransomware 2d ago

Researchers Observe Sub-One-Hour Ransomware Attacks

Halcyon says Akira is now capable of carrying out an entire ransomware attack in less than an hour

Infosecurity Magazine →

The Record Ransomware 2d ago

North Dakota water treatment plant reports March ransomware attack

A water treatment plant in the city of Minot, North Dakota, was hit with ransomware but city officials said it continues to operate normally.

The Record →

SC Media Ransomware 2d ago

Cyberattacks powered by stolen credentials on the rise

Cybersecurity incidents are increasingly centered on identity abuse, where stolen login credentials serve as the primary entry point for attackers, and the g...

T1078 T1598

SC Media →

SC Media Ransomware 2d ago

Monetization of ransomware-stolen data touted by new cybercrime service

Affiliates and customers are being sought by the new Leak Bazaar cybercrime service, which was reported by Flare researchers to be promoted across the dark w...

T1041

SC Media →

SC Media Ransomware Google 3d ago

Google Drive enhances ransomware protection with AI

The AI model, which has seen significant improvements since its beta phase, can now detect 14 times more ransomware infections at a faster rate.

SC Media →

SANS ISC Ransomware Apple Intel 3d ago

TeamPCP Supply Chain Campaign: Update 005 - First Confirmed Victim Disclosure, Post-Compromise Cloud Enumeration Documented, and Axios Attribution Narrows, (Wed, Apr 1st)

This is the fifth update to the TeamPCP supply chain campaign threat intelligence report, "When the Security Scanner Became the Weapon" (v3.0, March 25, 2026).

T1598

SANS ISC →

HackRead Ransomware 3d ago

Ransomware Groups Exploit Legit IT Tools to Bypass Antivirus

New research from Seqrite explains the ‘dual-use dilemma,’ where ransomware attackers repurpose legitimate IT tools like IOBit Unlocker…

HackRead →

BleepingComputer Ransomware Google 3d ago

Google Drive ransomware detection now on by default for paying users

Google announced that the AI-powered Google Drive ransomware detection feature has reached general availability and is now enabled by default for all paying ...

BleepingComputer →

Unit 42 Ransomware 3d ago

Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure

TeamPCP continues its string of supply chain attacks, and announces a partnership with Vect ransomware group. The post Weaponizing the Protectors: TeamPCP’s ...

T1195

Unit 42 →

SecurityWeek Ransomware 4d ago

Stolen Logins Are Fueling Everything From Ransomware to Nation-State Cyberattacks

Report shows how industrialized credential theft underpins ransomware, SaaS breaches, and geopolitical attacks, shifting security focus from prevention to de...

T1078

SecurityWeek →

1 2 3 ... 6 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA