Ransomware Trends 2025 – What’s new
As of February 2025, ransomware remains a formidable cyber threat, evolving in complexity and scale. The ransomware ecosystem has adapted to previous law enforcement disruptions,…
As of February 2025, ransomware remains a formidable cyber threat, evolving in complexity and scale. The ransomware ecosystem has adapted to previous law enforcement disruptions,…
Fake browser update scams now target Mac, Windows, and Android users, delivering malware like FrigidStealer, Lumma Stealer, and Marcher trojan through compromised websites. Cybersecurity researchers…
A recent investigation into Ivanti Endpoint Manager (EPM) has uncovered four critical vulnerabilities that could allow unauthenticated attackers to exploit machine account credentials for relay…
Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research and Development (R&D) Centre in Bengaluru, India. This initiative, unveiled during…
The so-called Superset tech stack, on which carmaker Volvo is building its software-defined cars, is behind the company’s next launch. The ES90 electric vehicle, which…
ESET researchers have uncovered a series of malicious activities orchestrated by a North Korea-aligned group known as DeceptiveDevelopment, active since early 20241. The cybercriminals pose…
Imagine this: Your back-office admin account, the keys to your iGaming kingdom, sold for a mere $10 on a dark web forum. The buyer? A…
An infostealer known as ACRStealer is using legitimate platforms like Google Docs and Steam as part of an attack, according to researchers. ACRStealer is often…
Cumbrian nuclear facility Sellafield is still under scrutiny for cyber security problems, despite the regulator’s clean bill of health for its physical security. The Office…
NailaoLocker ransomware targets EU healthcare-related entities Pierluigi Paganini February 20, 2025 NailaoLocker ransomware is a new threat that targeted European healthcare organizations from June to…
The Chinese state-sponsored Salt Typhoon hacking group uses a custom utility called JumbledPath to stealthily monitor network traffic and potentially capture sensitive data in cyberattacks…
A Dallas, Texas-based clinical research firm had its database exposed, containing sensitive personal healthcare records of over 1.6 million individuals – all without any security…