The Medusa ransomware group is operating at a fast pace by leveraging zero-days and quickly exploiting new bugs and breached ...
Microsoft says that Storm-1175, a China-based financially motivated cybercriminal group known for deploying Medusa ransomware ...
The Coruna iOS exploit kit is likely an updated version of the exploitation framework used in Operation Triangulation.
When we talk to people whose computers have been infected, they often ask how it happened. In a growing number of cases, they have been doing nothing more than reading a news website or browsing for ...
In a rapidly evolving cybersecurity landscape, the proliferation of ransomware continues to pose significant challenges to organizations worldwide. Recently, a new strain known as Akira Ransomware has ...
Forbes contributors publish independent expert analyses and insights. Davey Winder is a veteran cybersecurity writer, hacker and analyst. Admit it: the first thing you think of when ransomware is ...
90% of ransomware incidents exploit firewalls – and the fastest observed ransomware case took three hours from breach to encryption. Most widely detected CVE vulnerability dates from 2013 – 11% of ...
Multi-extortion ransomware relies on stolen data to pressure victims with public leaks. Penta Security explains how its D.AMO ...
Threat actors armed with Medusa ransomware are actively exploiting a maximum-severity security vulnerability in Fortra's GoAnywhere managed file transfer (MFT) product, sparking more questions about ...
A leaked exploit kit capable of hacking iPhones is now public, potentially putting millions of devices at risk—especially ...