Ransomware
Search documents
Feds are hunting teenage hackers
Fortune· 2026-01-01 11:27
The job posts don’t immediately raise alarms, even though they’re clearly not for tutoring or babysitting. “Female candidates are a PRIORITY, even if you aren’t from US, if you do not have a clear accent please feel free to inquire,” a public Telegram channel post on Dec. 15 stated. “INEXPERIENCED people are OKAY, we can train you from scratch but we expect you to absorb information and take in what you are learning.” Those who are interested are expected to be available from 12 pm EST to 6 pm EST on weekda ...
X @Bloomberg
Bloomberg· 2025-12-18 23:08
Two former employees of cybersecurity companies pleaded guilty to federal crimes for launching their own ransomware attacks in a plot to extort millions of dollars from victims around the US https://t.co/VSALwiKGgy ...
X @TechCrunch
TechCrunch· 2025-12-03 18:59
Fintech firm Marquis alerts dozens of US banks and credit unions of a data breach after ransomware attack https://t.co/0QeNwu6y2C ...
X @TechCrunch
TechCrunch· 2025-11-19 17:25
US, UK, and Australia sanction Russian ‘bulletproof’ web host used in ransomware attacks https://t.co/WVv2GQY54n ...
Rapid7 Q3 Threat Report Reveals Ransomware Alliances, AI Weaponization, and the Obsolescence of “Time to Patch”
Globenewswire· 2025-11-12 14:00
Core Insights - Rapid7's Q3 2025 Threat Landscape Report highlights the evolving tactics of threat actors, emphasizing the acceleration of vulnerability exploitation and the rise of ransomware groups leveraging artificial intelligence [1][2][5] Vulnerability Exploitation - The total number of newly exploited vulnerabilities decreased by 21% from Q2 to Q3 2025, yet attackers are increasingly targeting older, unpatched vulnerabilities, including those over a decade old [2] - The exploitation of critical vulnerabilities in Microsoft SharePoint (CVE-2025-53770) and Cisco ASA/FTD products illustrates the urgent need for timely patching [3] Ransomware Activity - The number of active ransomware groups surged to 88 in Q3 2025, up from 65 in Q2 and 76 in Q1, indicating a significant increase in ransomware activity [4] - New alliances among ransomware groups, such as Qilin, SafePay, and WorldLeaks, are targeting various industries and employing innovative tactics like fileless operations and single-extortion data leaks [4] AI and Cyber Warfare - Generative AI is facilitating the creation of sophisticated phishing campaigns and adaptive malware, lowering barriers for cybercriminals [5] - Nation-state actors from Russia, China, and Iran are refining their tactics, focusing on supply chain and identity system attacks, which blur the lines between espionage and disruption [5] Report Overview - The Rapid7 Threat Landscape Report provides a comprehensive analysis of global adversary behavior, covering various threats from ransomware to state-sponsored operations and AI-driven attacks [7]
X @mert | helius.dev
mert | helius.dev· 2025-11-08 20:55
it is 2025 and silicon valley elite still think publicly traceable blockchains like bitcoin are dangerous because "ransomware" while forgetting that cash is literally untraceableretardioCoinDesk (@CoinDesk):⚠️ @reidhoffman explains why Silicon Valley feared crypto: "crypto is... the preferred ransomware for people holding, you know, uh, critical infrastructure, hospitals, other kinds of things hostage." https://t.co/lPTHeKjl1b ...
X @Bloomberg
Bloomberg· 2025-11-04 16:13
Cybersecurity Threats - Three cybersecurity company employees allegedly engaged in criminal hacking activities [1] - The alleged plot involved launching ransomware attacks [1] - The aim was to extort millions of dollars from victims across the US [1]
X @Bloomberg
Bloomberg· 2025-11-03 21:48
Three employees at cybersecurity companies spent years moonlighting as criminal hackers, launching their own ransomware attacks in a plot to extort millions of dollars from victims around the country, US prosecutors allege https://t.co/uVx9DtjhqV ...
X @TechCrunch
TechCrunch· 2025-11-03 19:51
Three people, including two U.S. ransomware negotiators, are accused of working on behalf of the ALPHV/BlackCat ransomware gang. https://t.co/o2sug8dXAz ...
CrowdStrike 2025 European Threat Landscape Report: Ransomware Hits Region at Record Pace
Businesswire· 2025-11-03 08:02
Core Insights - The 2025 European Threat Landscape Report by CrowdStrike indicates that European organizations represent nearly 22% of global ransomware and extortion victims, ranking second after North America [1] - Ransomware operations are accelerating, with adversary groups like SCATTERED SPIDER increasing deployment speed by 48%, resulting in an average attack duration of just 24 hours [1] Summary by Category Ransomware Impact - European organizations are significantly affected, accounting for almost 22% of global ransomware victims [1] - This positions Europe as the second most impacted region, following North America [1] Ransomware Operations - The speed of ransomware deployment is increasing, with a noted 48% rise in speed by groups such as SCATTERED SPIDER [1] - The average time taken for a ransomware attack has decreased to just 24 hours [1]