A multi-billion-dollar industry – run by people who aren’t afraid of a good fight – has cropped up to protect companies ...
A ransomware variant favored by a pro-Russia hacktivist group is back on the scene with a new version that has a fatal flaw — it keeps artifacts that allow victims to decrypt their files. VolkLocker ...
The pro-Russian hacktivist group known as CyberVolk (aka GLORIAMIST) has resurfaced with a new ransomware-as-a-service (RaaS) offering called VolkLocker that suffers from implementation lapses in test ...
A highly advanced “packer-as-a-service” known as Shanya, also referred to as VX Crypt, has become the preferred weapon for ransomware gangs seeking to evade security tools. According to a new research ...
Black Hat Europe 2025 opened with a presentation by Max Smeets of Virtual Rotes titled ‘Inside the Ransomware Machine’. The talk focused on the LockBit ransomware-as-a-service (RaaS) gang and Max’s ...
The LockBit ransomware group is making a comeback, with a new data leak site and 21 new victims. LockBit was once the most feared ransomware group, and it still vastly outnumbers other ransomware ...
Broken decryption tools. Abandoned negotiations. Operatives going rogue. The May 2025 LockBit breach exposed a range of operational details behind one of the world’s most prolific ...
This tool is intended solely for legally authorized enterprise security development activities. If you need to test the tool's functionality, please set up your own target machine environment. While ...
Fintech company Marquis is notifying dozens of U.S. banks and credit unions that they had customer data stolen in a cyberattack earlier this year. Details of the cyberattack emerged this week after ...
Two Russian web-hosting services that provide cover for ransomware operators, including LockBit, have been sanctioned by the U.S. Treasury’s Office of Foreign Assets Control (OFAC) and international ...
Cybercriminals have weaponized the framework of a relatively new, free, open-source security penetration tool, AdaptixC2, to deliver malicious payloads. Its rapid adoption by bad actors follows an ...