Search results for: “ransomware”
-

Akira Ransomware Group Claims 23GB Data Exfiltration from Apache OpenOffice
The Akira ransomware group claims to have exfiltrated 23GB of data from Apache OpenOffice, including sensitive employee and financial records. The Apache Software Foundation has not yet confirmed the alleged breach, while Akira continues its double extortion attacks globally.
-

AdaptixC2 Framework: A Growing Threat in Ransomware Operations
The open-source AdaptixC2 command-and-control framework is increasingly being used by threat actors, including those linked to Russian ransomware operations, highlighting the misuse of penetration testing tools for malicious campaigns.
-

Qilin Ransomware Combines Linux Payload With BYOVD Exploit in Hybrid Attack
Cisco Talos and Trend Micro researchers have observed the Qilin ransomware group deploying a Linux payload on Windows systems using a BYOVD technique, marking a hybrid attack blending cross-platform execution with legitimate IT tools.
-

Everest Ransomware Claims AT&T Careers Breach With 576K Records
Everest ransomware claims it holds 576,686 AT&T Careers records; AT&T has not confirmed, and no sample data is published yet.
-

Volkswagen investigates 8Base ransomware data breach claims
Ransomware group 8Base has claimed responsibility for an alleged data theft from Volkswagen. The automaker confirmed a “security incident” but says core IT systems were unaffected.
-

Muji online store disrupted after supplier ransomware attack: what was actually affected
Muji disabled its Japan online store after logistics partner Askul suffered a ransomware attack that halted order acceptance and shipping; investigation into any data exposure is ongoing as of Oct 21, 2025.
-

Askul ransomware outage halts Muji and Loft online sales in Japan
Askul confirmed a ransomware-triggered system failure that paused orders and shipments across three sites, forcing Muji and Loft to suspend domestic online sales while recovery work continues.
-

Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks
Bad actors are deploying Matrix Push C2, a new command-and-control platform for sophisticated phishing attacks. This framework uses web browser notifications to deliver malicious links across various operating systems, employing a fileless approach that bypasses traditional security. Offered as “Malware-as-a-Service” (MaaS), Matrix Push C2 enables threat actors to send deceptive alerts, tricking victims into visiting…
-

10 Cyber Security Tools for 2025
Cybersecurity tools protect devices, systems, applications, networks, and data from cyber threats. These solutions improve security posture, manage compliance, and maintain reputation, preventing costly fixes.
-

Sanctions Hit Russia’s Bulletproof Hosting Provider
U.S., UK, and Australia sanction Russia-based Media Land for providing bulletproof hosting to ransomware groups like LockBit, BlackSuit, and Play, freezing assets and prohibiting transactions.
