Ransomware Groups Demystified: Lynx Ransomware
Rapid7 » Ransomware
by
1M ago
As part of our research and tracking of threats, Rapid7 Labs is actively monitoring new and upcoming threat groups and the ransomware domain is known for having a large number of them ..read more
Visit website
Ransomware Groups Demystified: CyberVolk Ransomware
Rapid7 » Ransomware
by
1M ago
As part of our ongoing efforts to monitor emerging cyber threats, we have analyzed the activities of CyberVolk, a politically motivated hacktivist group that transitioned into using ransomware and has been active since June 2024 ..read more
Visit website
Our 4 Essential Strategy Takeaways from the Gartner® 2024 Report – How to Prepare for Ransomware Attacks
Rapid7 » Ransomware
by
2M ago
The 2024 Gartner report, “How to Prepare for Ransomware Attacks”, provides critical insights into the latest tactics used by bad actors and offers practical solutions on how to fortify defenses ..read more
Visit website
Selling Ransomware Breaches: 4 Trends Spotted on the RAMP Forum
Rapid7 » Ransomware
by
3M ago
The sale and purchase of unauthorized access to compromised enterprise networks has become a linchpin for cybercriminal operations, particularly in facilitating ransomware attacks ..read more
Visit website
Rapid7’s Ransomware Radar Report Shows Threat Actors are Evolving …Fast.
Rapid7 » Ransomware
by
4M ago
The Ransomware Radar Report offers some startling insights into who ransomware threat actors are and how they’ve been operating in the first half of 2024 ..read more
Visit website
Key Takeaways From The Take Command Summit: Unlocking Security Success
Rapid7 » Ransomware
by
4M ago
As cybersecurity threats continue to evolve, so must our defenses. The recent Rapid7 Take Command Summit provided invaluable insights into preparing for, responding to, and recovering from ransomware attacks ..read more
Visit website
Ongoing Malvertising Campaign leads to Ransomware
Rapid7 » Ransomware
by
7M ago
Rapid7 has observed an ongoing campaign to distribute trojanized installers for WinSCP and PuTTY via malicious ads on commonly used search engines, where clicking on the ad leads to typo squatted domains ..read more
Visit website
Layered Defense to Stop Attacks Before they Begin
Rapid7 » Ransomware
by
7M ago
Ransomware has evolved from opportunistic attacks to highly orchestrated campaigns driven by cyber criminals who are seeking high financial gains ..read more
Visit website
Ongoing Social Engineering Campaign Linked to Black Basta Ransomware Operators
Rapid7 » Ransomware
by
7M ago
Rapid7 observes ongoing social engineering campaign consistent with Black Basta ..read more
Visit website
Exploring the (Not So) Secret Code of Black Hunt Ransomware
Rapid7 » Ransomware
by
10M ago
In this analysis we examined the BlackHunt sample shared on X (formerly Twitter). During our analysis we found notable similarities between BlackHunt ransomware and LockBit, which suggested that it uses leaked code of Lockbit. In addition, it uses some techniques similar to REvil ransomware ..read more
Visit website

Follow Rapid7 » Ransomware on FeedSpot

Continue with Google
Continue with Apple
OR