News
A recently discovered ransomware strain called HybridPetya can bypass the UEFI Secure Boot feature to install a malicious ...
HybridPetya ransomware exploits CVE-2024-7344 to bypass UEFI Secure Boot, encrypts NTFS MFT, and demands $1,000 Bitcoin ...
PromptLock is only a prototype of LLM-orchestrated ransomware, but hackers already use AI in file encryption and extortion ...
The new group relies on data theft and encryption, but coding errors in its ransom note routine expose weaknesses that ...
The latest research into cybercrime and those behind it illustrates why businesses must quickly adapt to the rising tide of ...
“While open-source malware is a threat, it also gives defenders opportunities to detect and mitigate these variations.
AttackIQ has released a new attack graph that emulates the behaviors exhibited by Warlock ransomware, which emerged in June 2025. Beginning in July, Warlock operators have primarily targeted ...
Cybercriminals are increasingly using generative AI tools to fuel their attacks, with new research finding instances of AI ...
As the attack surface expands and the threat landscape grows more complex, it’s time to consider whether your data protection ...
In a world where ransomware has morphed into data extortion, encryption is just the bait. The real threat is what’s already gone by the time you realize anything’s wrong. The Fast Company Executive ...
ShardSecure®, an innovator in agentless file-level encryption and ransomware data resilience, today announced an expanded partnership with Entrust®, a global leader in identity-centric security ...
Ransomware demand of $1M followed stolen credential login; legacy defenses missed it, proving identity is today’s perimeter.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results