Accelerated Akira ransomware intrusions examined
CyberScoop reports that increasingly efficient techniques have significantly reduced the Akira ransomware operation's attack times.
20 articles
CyberScoop reports that increasingly efficient techniques have significantly reduced the Akira ransomware operation's attack times.
Multi-extortion ransomware relies on stolen data to pressure victims with public leaks. Penta Security explains how its D.
Hackers are abusing the long-running Phorpiex (Trik) botnet to run large-scale ransomware, sextortion, and crypto-clipping operations, turning one infrastruc...
North Dakota's Minot Water Treatment Plant, which serves roughly 80,000 people in Minot and surrounding communities, had its SCADA system impacted by a ranso...
Major Japanese multinational automaker Nissan has confirmed having its data compromised in a cyberattack against a third-party vendor earlier this year after...
Attackers are leveraging tools like Process Hacker and IOBit Unlocker, which possess deep operating system access.
The specific type of cyberattack, such as ransomware, has not been disclosed by Hasbro.
A new report from Halcyon finds that the group also puts more effort than usual into developing working decryptors, likely to incentivize businesses to pay u...
After linking the Axios npm supply chain attack to North Korean hackers, Google researchers warned that “hundreds of thousands of stolen secrets could potent...
A newly identified ransomware campaign is targeting Windows users across South America, leveraging tactics that closely mimic the notorious Akira ransomware ...
Halcyon says Akira is now capable of carrying out an entire ransomware attack in less than an hour
A water treatment plant in the city of Minot, North Dakota, was hit with ransomware but city officials said it continues to operate normally.
Cybersecurity incidents are increasingly centered on identity abuse, where stolen login credentials serve as the primary entry point for attackers, and the g...
Affiliates and customers are being sought by the new Leak Bazaar cybercrime service, which was reported by Flare researchers to be promoted across the dark w...
The AI model, which has seen significant improvements since its beta phase, can now detect 14 times more ransomware infections at a faster rate.
This is the fifth update to the TeamPCP supply chain campaign threat intelligence report, "When the Security Scanner Became the Weapon" (v3.0, March 25, 2026).
New research from Seqrite explains the ‘dual-use dilemma,’ where ransomware attackers repurpose legitimate IT tools like IOBit Unlocker…
Google announced that the AI-powered Google Drive ransomware detection feature has reached general availability and is now enabled by default for all paying ...
TeamPCP continues its string of supply chain attacks, and announces a partnership with Vect ransomware group. The post Weaponizing the Protectors: TeamPCP’s ...
Report shows how industrialized credential theft underpins ransomware, SaaS breaches, and geopolitical attacks, shifting security focus from prevention to de...