Search results for: “ransomware”
Showing results matching your search
Refine your search
-
Volkswagen investigates 8Base ransomware data breach claims
Ransomware group 8Base has claimed responsibility for an alleged data theft from Volkswagen. The automaker confirmed a “security incident” but says core IT systems were unaffected.
·
·
1–2 minutes -
Muji online store disrupted after supplier ransomware attack: what was actually affected
Muji disabled its Japan online store after logistics partner Askul suffered a ransomware attack that halted order acceptance and shipping; investigation into any data exposure is ongoing as of Oct 21, 2025.
·
·
2–3 minutes -
Askul ransomware outage halts Muji and Loft online sales in Japan
Askul confirmed a ransomware-triggered system failure that paused orders and shipments across three sites, forcing Muji and Loft to suspend domestic online sales while recovery work continues.
·
·
3–4 minutes -
Cyber & Electronic Warfare · Digital Espionage & Intelligence · IranRevolution2026 · Operations & Campaigns · Threat Actors
Handala Rebounds After FBI Seizure, Exposing Iran Cyberwar Resilience
After the FBI and DOJ seized Handala-linked domains on March 20, 2026, the Iran-linked group restored its web presence within about a day. The case shows why domain takedowns disrupt visibility faster than capability.
·
·
8–12 minutes -
Cyber & Electronic Warfare · Digital Espionage & Intelligence · IranRevolution2026 · Operations & Campaigns
Iran Cyberwar: Identity Systems Become the Target
After the March 11, 2026 Stryker cyberattack, evidence shows a shift in the Iran cyberwar: attackers are targeting identity systems and endpoint management platforms to disrupt global operations.
·
·
9–13 minutes -
Trivy Supply Chain Attack Spreads Infostealer, Worm, and Kubernetes Wiper via Docker Hub
A supply chain attack targeting Aqua Security’s Trivy vulnerability scanner led to the distribution of malicious artifacts via Docker Hub, deploying TeamPCP infostealer, a worm, and a Kubernetes wiper.
·
·
2–3 minutes -
CISA Warns on Microsoft Intune After Stryker Cyberattack
CISA said on March 19 it is aware of malicious activity targeting endpoint management systems and urged organizations to harden Microsoft Intune configurations after the March 11 cyberattack on Michigan-based medical technology company Stryker.
·
·
1–2 minutes -
Top 10 Signs a CVE Needs Emergency Patching
Emergency CVE patching starts with the right signals. These 10 indicators help defenders identify which vulnerabilities need immediate action based on exploitation evidence, exposure, exploit maturity, and business impact.
·
·
6–10 minutes -
Incident Response Playbook: How to Triage, Contain, Investigate, and Recover
An incident response playbook should do more than list phases on a slide. This practical guide explains how to triage fast, contain without destroying evidence, assign decisions clearly, manage communications, and move from investigation to…
·
·
10–15 minutes -
FortiGate devices exploited to steal service account credentials and breach networks
SentinelOne says attackers are abusing FortiGate appliances as entry points, extracting configuration data, harvesting service account credentials, and using that access to move deeper into victim networks.
·
·
2–4 minutes





