Security News

Learn actionable tactics for IT departments on how to manage backups and enable staff so that ransomware is no longer a mythical threat, but a controlled risk. Secure Backup is your best line of...

The new Veeam Data Platform delivers secure ransomware protection with immutable and air‑gapped backup and Instant Recovery at scale of any workload in your multi‑cloud infrastructure. No one can...

Be prepared for ransomware attacks and recover with confidence. Veeam® is the market leader in backup and recovery, both on premises and in the cloud. We offer instant, scalable recovery options...

Tactical similarities have been unearthed between the double extortion ransomware group known as Rhysida and Vice Society, including in their targeting of education and healthcare sectors. "As Vice Society was observed deploying a variety of commodity ransomware payloads, this link does not suggest that Rhysida is exclusively used by Vice Society, but shows with at least medium confidence that Vice Society operators are now using Rhysida ransomware," Check Point said in a new report.

Ransomware shows no signs of slowing, with ransomware activity ending 13 times higher than at the start of 2023 as a proportion of all malware detections, according to Fortinet. FortiGuard Labs has documented substantial spikes in ransomware variant growth in recent years, largely fueled by the adoption of Ransomware-as-a-Service.

An unknown threat actor is using a variant of the Yashma ransomware to target various entities in English-speaking countries, Bulgaria, China, and Vietnam at least since June 4, 2023. The disclosure comes as the cybersecurity company said that leaks of ransomware source code and builders are leading to the acceleration of new ransomware variants, thereby resulting in more attacks.

The negotiation team will work to uncover the motives of the attacker, investigate the source, contain the threat, minimise the breach exposure time and then help to remediate and recover as a way to break the cycle of threats. What benefits does this delay offer, and how can it impact the outcome of a ransomware attack?

Ransomware remains a lucrative tool for cybercriminals as attackers continue to target a wide array of businesses. In response to this growing threat, an increasing number of organizations are compelled to meet ransom demands, perceiving it as their only viable course of action.

The Clop ransomware gang has once again altered extortion tactics and is now using torrents to leak data stolen in MOVEit attacks. On June 14th, the ransomware gang began extorting its victims, slowly adding names to their Tor data leak site and eventually publicly releasing the files.

Ransomware gangs continue to prioritize targeting VMware ESXi servers, with almost every active ransomware gang creating custom Linux encryptors for this purpose. Hospitals run by Prospect Medical Holdings were also impacted this week by a ransomware attack on the parent company.