Ransomware

Has RedCurl Transformed From Espionage to Ransomware Warfare?
Malware & Threats Has RedCurl Transformed From Espionage to Ransomware Warfare?

In a noteworthy shift in the landscape of cyber threats, RedCurl, a notorious Russian-speaking hacking group traditionally known for corporate espionage, has recently turned its focus to ransomware deployment. This transformation marks a significant evolution in their operational tactics and poses

CrushFTP Vulnerability Exploited: Urgent Update Needed
Infrastructure & Network Security CrushFTP Vulnerability Exploited: Urgent Update Needed

A critical vulnerability has been identified in the CrushFTP file transfer server software, designated as CVE-2025-2825, which has come under active exploitation by cybercriminals. This vulnerability permits attackers to bypass authentication and gain unauthorized access to the server, earning it a

What Are the Riskiest Connected Devices in 2024?
Endpoint & Device Security What Are the Riskiest Connected Devices in 2024?

The year 2024 presents a rapidly evolving cyber-threat landscape that organizations must navigate with vigilance. A comprehensive examination by Forescout Research - Vedere Labs reveals distinct cyber risks across various categories of connected devices. From Information Technology (IT)

UK Introduces Bill to Boost Cyber Resilience in Public Services and NHS
Infrastructure & Network Security UK Introduces Bill to Boost Cyber Resilience in Public Services and NHS

In an ambitious move to protect the nation's critical services from the growing threat of cyber attacks, the UK has introduced the Cyber Security and Resilience Bill. Announced in the King's Speech in July 2024, the bill is directly aimed at enhancing cyber defenses for public services, including

How Are Ox Thief’s Extortion Tactics Changing Ransomware Scenarios?
Infrastructure & Network Security How Are Ox Thief’s Extortion Tactics Changing Ransomware Scenarios?

How Are Ox Thief’s Extortion Tactics Changing Ransomware Scenarios? The shadowy world of ransomware continues to evolve, with cybercriminals developing increasingly sophisticated techniques to pressure victims into paying ransoms. The emergence of Ox Thief, a recently identified extortion group,

FortiGate Firewalls Under Attack: Urgent Security Measures Advised
Malware & Threats FortiGate Firewalls Under Attack: Urgent Security Measures Advised

In a concerning development for cybersecurity, Arctic Wolf has issued a critical warning regarding ongoing malicious activities targeting management interfaces of FortiGate firewall devices exposed to the public internet. The attacks, which reportedly started in early December of last year, have

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later