Bulk Email Theft May Point to Russian Espionage

Security Intelligence – Security Intelligence – Bulk Email Theft May Point to Russian Espionage Home&nbsp/ News Bulk Email Theft May Point to Russian Espionage Share Cybersecurity researchers recently identified a…

How a Cyber Criminal Justice System Resolves Disputes

Security Intelligence – Security Intelligence – How a Cyber Criminal Justice System Resolves Disputes The darknet community uses its own underground justice system to solve disputes that arise between one…

Sabbath Ransomware Gang Targets Critical Infrastructure, Backups

Security Intelligence – Security Intelligence – Sabbath Ransomware Gang Targets Critical Infrastructure, Backups A ransomware gang known as Sabbath is going after critical infrastructure groups in North America. In addition,…

Egregor Ransomware Analysis: Origins, M.O., Victims

A new year brings about countless new opportunities, but also, unfortunately, the chance for old threats to make a comeback and evolve. Such is the case with Egregor ransomware. Since…

REvil/Sodinokibi Ransomware: Origin, Victims, Prevention Strategies

This post is also available in: Danish Cyberattacks have become a part of our reality, but have you ever wondered what might happen if your company gets targeted? You probably…

Pysa Ransomware: Overview, Operation Mode, Prevention

At the very least, the Pysa ransomware was first deployed in October 2018. The initial versions of the ransomware created encrypted files with the “.locked” extension, which is common among…

Maze Ransomware: Origins, Operating Mode, Attacks

This post is also available in: Danish Coming back to your laptop only to find all your data encrypted and a defiant message on your screen asking you for money…

Ryuk Ransomware: Origins, Operation Mode, Mitigation

What is Ryuk Ransomware? Widely known for targeting governments, academia, healthcare, manufacturing, and technology organizations’ cybersystems, Ryuk is a ransomware-as-a-service (RaaS) group that’s been active since August 2018. It typically encrypts data…