Topic: ransomware trends

  • Ransomware's New Tactic: Creating Chaos

    Ransomware's New Tactic: Creating Chaos

    Ransomware attacks are increasing in frequency and sophistication, with over half occurring during weekends or holidays to exploit reduced staffing, and groups now employing aggressive tactics like quadruple extortion to cause operational paralysis. The economics are shifting as fewer victims pay...

    Read More »
  • Ransomware's Relentless Spread: A Growing Threat

    Ransomware's Relentless Spread: A Growing Threat

    Ransomware is expanding globally into new regions and sectors, with attackers increasingly targeting areas with less mature security defenses. The public sector is a high-risk target due to uneven security practices, with a concerning segment showing both high exposure and weak controls. Future r...

    Read More »
  • Retailers Are Fighting Back Against Ransomware

    Retailers Are Fighting Back Against Ransomware

    The retail sector is seeing a decline in data encryption during ransomware attacks, but attackers are increasingly using extortion-only tactics and demanding higher ransoms, which have doubled to a median of two million dollars. Recovery costs and times have improved, with expenses dropping by 40...

    Read More »
  • Hackers Ditch Encryption, Focus on Data Theft and Extortion

    Hackers Ditch Encryption, Focus on Data Theft and Extortion

    Cybercriminals are increasingly shifting from ransomware to "encryptionless" extortion, stealing and threatening to release data without locking files, which bypasses traditional defenses. The primary attack methods involve exploiting unpatched software vulnerabilities and supply chain weaknesses...

    Read More »
  • 40 Open-Source Security Tools & The Rise of Invisible IT

    40 Open-Source Security Tools & The Rise of Invisible IT

    The cybersecurity landscape is being reshaped by open-source tools and AI-driven threats, with open-source security applications offering critical capabilities without licensing fees and AI integration altering both defense and attack strategies. AI agents and large language models (LLMs) introdu...

    Read More »
  • WSUS Flaw Exploited, BIND 9 PoC Published in Security Review

    WSUS Flaw Exploited, BIND 9 PoC Published in Security Review

    The digital security landscape is rapidly evolving with emerging threats like biometric innovations such as EarID for identity verification and critical infrastructure risks in healthcare and smart homes, requiring proactive defense strategies. New tools and vulnerabilities are shaping cybersecur...

    Read More »
  • FortiSIEM PoC Released, Rakuten Viber CISO on Messaging Risks

    FortiSIEM PoC Released, Rakuten Viber CISO on Messaging Risks

    A critical FortiSIEM vulnerability (CVE-2025-64155) now has a public exploit, heightening the urgency for immediate patching, while other vendors like Cisco also addressed actively exploited flaws. Security teams are exploring unconventional intelligence sources, such as torrent metadata, and fac...

    Read More »
  • UK Schools Hit by Student-Led Data Breaches, ICO Warns

    UK Schools Hit by Student-Led Data Breaches, ICO Warns

    Over half of UK school insider data breaches are committed by students, often using simple tactics like guessing weak passwords or accessing staff credentials. These actions, while sometimes driven by curiosity, risk leading young people toward cybercrime, with incidents including unauthorized ac...

    Read More »