-
In a significant escalation of the global cyber threat landscape, the notorious threat group ShinyHunters appears to be transitioning from data theft to full-scale ransomware operations. Cybersecurity researchers have identified an early build of a new…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The Akira ransomware group has begun weaponizing vulnerabilities in SonicWall SSL VPN devices, turning merger-and-acquisition (M&A) processes into high-speed launchpads for cyberattacks. This trend exposes dangerous blind spots for businesses acquiring smaller companies, as inherited SonicWall devices often serve as easy entry points for attackers. How Akira Ransomware Targets M&A Environments During mergers and acquisitions, […] The post Akira Ransomware Uses SonicWall VPN Exploit to Exfiltrate Sensitive Data appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The notorious Cl0p ransomware gang has publicly claimed responsibility for breaching Broadcom, a leading semiconductor and infrastructure software company. According to threat intelligence sources, the attackers exploited an unpatched zero-day vulnerab…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The notorious Clop ransomware gang, also known as Graceful Spider, has listed Oracle Corporation on its dark web leak site, claiming to have successfully breached the technology giant’s internal systems. This alarming development represents a sig…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The U.S. Department of the Treasury, Australia, and the United Kingdom have announced coordinated sanctions against Media Land. This Russia-based bulletproof hosting company provides infrastructure to ransomware and other cybercriminals. The U.S. Federal Bureau of Investigation also coordinated the action targeting the company’s leadership team and related entities. Bulletproof hosting providers offer specialized servers designed […] The post Authorities Sanctioned Russia-based Bulletproof Hosting Provider for Supporting Ransomware Operations appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The holiday shopping rush has always been the retail industry’s busiest and riskiest time of year. As e-commerce traffic, in-store digital systems, and supply-chain automation have evolved, so too have attackers. The weeks surrounding Black Frida…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Ransomware is shifting from traditional systems to cloud environments, fundamentally redefining its impact on cloud-native data. As organizations increasingly migrate to cloud platforms, threat actors are adapting their tactics moving away from traditi…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The United States, Australia, and the United Kingdom have announced coordinated sanctions against Media Land, a Russia-based bulletproof hosting provider, and related entities for supporting ransomware operations and other cybercrimes. The Department o…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Cybereason Threat Intelligence Team has uncovered a sophisticated ransomware operation known as “The Gentlemen,” which emerged around July 2025 and quickly established itself as a formidable threat actor. Operating with a dual-extortion met…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A sophisticated Akira ransomware attack orchestrated by the Howling Scorpius group recently left a global data storage and infrastructure company grappling with massive operational disruption all triggered by a single, seemingly innocent click on a web…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


