Search results for: “ransomware”
-

AdaptixC2 Framework: A Growing Threat in Ransomware Operations
The open-source AdaptixC2 command-and-control framework is increasingly being used by threat actors, including those linked to Russian ransomware operations, highlighting the misuse of penetration testing tools for malicious campaigns.
-

Qilin Ransomware Combines Linux Payload With BYOVD Exploit in Hybrid Attack
Cisco Talos and Trend Micro researchers have observed the Qilin ransomware group deploying a Linux payload on Windows systems using a BYOVD technique, marking a hybrid attack blending cross-platform execution with legitimate IT tools.
-

Everest Ransomware Claims AT&T Careers Breach With 576K Records
Everest ransomware claims it holds 576,686 AT&T Careers records; AT&T has not confirmed, and no sample data is published yet.
-

Volkswagen investigates 8Base ransomware data breach claims
Ransomware group 8Base has claimed responsibility for an alleged data theft from Volkswagen. The automaker confirmed a “security incident” but says core IT systems were unaffected.
-

Muji online store disrupted after supplier ransomware attack: what was actually affected
Muji disabled its Japan online store after logistics partner Askul suffered a ransomware attack that halted order acceptance and shipping; investigation into any data exposure is ongoing as of Oct 21, 2025.
-

Askul ransomware outage halts Muji and Loft online sales in Japan
Askul confirmed a ransomware-triggered system failure that paused orders and shipments across three sites, forcing Muji and Loft to suspend domestic online sales while recovery work continues.
-

What is GlobalProtect? Palo Alto Networks VPN Gateway Explained
GlobalProtect is Palo Alto Networks’ enterprise remote access gateway. This explainer covers how it works, why it matters, and the security considerations organizations should understand about CVE-2024-3400 and enterprise VPN security.
-

What is a Zero-Day Vulnerability?
A zero-day vulnerability is a software flaw unknown to its vendor or the public, making it exceptionally dangerous due to immediate exploitation by malicious actors before patches are available. These vulnerabilities are critical in cyber warfare, digital espionage, and sophisticated cybercrime, enabling covert operations and high-impact attacks.
-

Why Natural Disasters Outpace Cyber Threats in Destructive Power
This article provides a ‘Cyber Threat Perspective,’ comparing the destructive power of cyber incidents with natural catastrophes. It highlights that while cyberattacks cause economic disruption and data loss, their long-term physical destruction rarely matches the damage from natural disasters. The piece emphasizes the importance of a balanced view for robust risk management and policy-making.
-

Global Fraud Rings Explained
Global fraud rings are highly organized, transnational criminal enterprises that use intricate networks and sophisticated tactics to illicitly acquire money, assets, or sensitive information from individuals, corporations, and national economies across international borders.
