Security News
![Hacker leaks Orange is the New Black new season after ransom demands ignored (ArsTechnica)](/static/build/img/news/alt/cyber-threat-stats-small.jpg)
![Hacker leaks 'Orange is the New Black' Season 5 after Netflix refused to Pay Ransom (The Hackers News)](/static/build/img/news/alt/cyberthreat-stats-small.jpg)
After releasing 10 back-to-back episodes of the Season 5 premiere of Netflix's "Orange Is the New Black," a hacking group calling itself The Dark Overlord is threatening to leak a trove of other...
![15 new ransomware decryption tools added to No More Ransom (Help Net Security)](/static/build/img/news/alt/Data-Cybersecurity-Predictions-small.jpg)
Nine months after the launch of the No More Ransom (NMR) project, an ever-growing number of law enforcement and private partners have joined the initiative, allowing more victims of ransomware to...
![No More Ransom — 15 New Ransomware Decryption Tools Available for Free (The Hackers News)](/static/build/img/news/alt/ransomware-stats-small.jpg)
No More Ransom, so is the Ransomware Threat. Launched less than a year ago, the No More Ransom (NMR) project has increased its capacity with new partners and new decryption tools added to its now...
![Cybercriminals ignore individuals, focus on holding the enterprise to ransom (ZDNet)](/static/build/img/news/alt/web-stats-small.jpg)
![Ransom scam exploits Apple iOS Safari flaw to target porn viewers (ZDNet)](/static/build/img/news/alt/mac-stats-small.jpg)
![Apple iCloud ransom demands: The facts you need to know (ZDNet)](/static/build/img/news/alt/mac-stats-small.jpg)
![UK infosec's greatest threat? Thug malware holding nation's devices to ransom report (The Register)](/static/build/img/news/alt/cyberattack-costs-scaled-small.jpg)
![Week in review: MySQL databases held for ransom, CloudPets as surveillance devices (Help Net Security)](/static/build/img/news/alt/breach-statistics-small.jpg)
Here’s an overview of some of last week’s most interesting news, podcasts and articles: Google releases details, PoC exploit code for IE, Edge flaw As we’re impatiently waiting for Microsoft to...
![Cyber extortionists hold MySQL databases for ransom (Help Net Security)](/static/build/img/news/alt/breach-statistics-small.jpg)
Ransomware has become cyber crooks’ favorite attack methodology for hitting businesses, but not all cyber extortion attempts are effected with this particular type of malware. Since the beginning...