Nitrogen ransomware’s ESXi encryptor corrupts its own public key, making file recovery impossible, even if victims pay.
Modern ransomware has shifted from encryption to psychological extortion that exploits fear, liability, and exposure. Flare ...
A key-handling defect in the ransomware can permanently lock files by discarding private encryption keys, leaving affected ...
A state vendor and major provider of workers’ compensation insurance in Rhode Island confirmed it was the victim of a ...
Only a quarter (24%) of ransomware incident involved the encryption of data. Data was stolen and either leaked or retained in 54% of cases analyzed. These multidimensional tactics appear largely ...
Bitdefender has released a decryptor for the 'ShrinkLocker' ransomware strain, which uses Windows' built-in BitLocker drive encryption tool to lock victim's files. Discovered in May 2024 by ...
Attacks linked to APT and ransomware groups are relying on DLL sideloading for code execution instead of exploit-based initial access.
The Australian Cyber Security Centre (ACSC) and the United States’ Cyber Security and Infrastructure Security Agency (CISA), have published updated intelligence on the activities of the dangerous ...
A new Osiris ransomware exploits fresh tactics to infect systems, encrypt files, and evade detection, triggering urgent ...
Experts uncovered a new Osiris ransomware strain that used a custom POORTRY driver in a BYOVD attack to disable security tools & steal data in 2025.
SecuritySnares’ solution provides preventative measures to stop malicious encryption and data exfiltration execution. The technology is designed to eliminate disruption related to ransomware, prevent ...
DragonForce is taking cues from organized crime, emphasizing cooperation and coordination among ransomware gangs.