Ransomware

Blue Yonder Ransomware Attack Exposes Supply Chain Vulnerabilities
Malware & Threats Blue Yonder Ransomware Attack Exposes Supply Chain Vulnerabilities

On November 21, Blue Yonder, a US-based supply chain SaaS vendor, found itself grappling with a severe ransomware attack that brought significant service disruptions to its managed services environment. Despite the concerted efforts of both internal teams and external cybersecurity firms to restore

How Does AWS SIR Enhance Your Security Incident Management?
Security Operations & Management How Does AWS SIR Enhance Your Security Incident Management?

In a digital landscape fraught with cyber threats, preparing for and efficiently managing security incidents is crucial. AWS has unveiled the AWS Security Incident Response (SIR) service, which aims to empower organizations with the necessary tools to counter increasingly sophisticated security

How Are Threat Actors Exploiting Veeam Vulnerability for Ransomware?
Malware & Threats How Are Threat Actors Exploiting Veeam Vulnerability for Ransomware?

In a recent wave of cyberattacks, threat actors have exploited a vulnerability in Veeam backup servers identified as CVE-2024-40711 to deploy a new ransomware strain known as "Frag." This exploit is part of a broader threat activity cluster named STAC 5881, which bears striking similarities to

Can Bitdefender's Decryptor Tool Counter ShrinkLocker Ransomware?
Malware & Threats Can Bitdefender's Decryptor Tool Counter ShrinkLocker Ransomware?

Ransomware attacks continue to pose significant challenges across industries and governmental sectors, and one recent variant known as ShrinkLocker is causing substantial concern. Detected in May, ShrinkLocker achieves its malicious objectives by employing a relatively simple yet effective

Top Ransomware Recovery Tools in 2025: A Comprehensive Guide
Data Protection & Privacy Top Ransomware Recovery Tools in 2025: A Comprehensive Guide

Ransomware attacks have become a significant threat to businesses of all sizes. These malicious incidents can severely disrupt operations, compromise sensitive data, and result in substantial financial losses, underlining the need for robust recovery tools. With more than 66% of surveyed

Enhancing Cyber Resilience: A Call for Unified Business Strategy
Security Operations & Management Enhancing Cyber Resilience: A Call for Unified Business Strategy

In the contemporary digital landscape, businesses worldwide face an escalating threat from cyber-attacks. Australia's business community, in particular, demonstrates a concerning level of apathy and complacency toward cyber risk. A landmark discussion in federal parliament aims to strengthen

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later