Home Cybercrime Ransomware

Ransomware

Ransomware news and articles. Stay up to date with the latest cyber crime trends. Enjoy exciting stories of cybercriminals using online extortion. From hackers and organized crime to some nation state sponsored hackers. The Cyber Post brings you world wide cyber security news dedicated to ransomware.

In today’s digital age criminals are always lurking on the web. Whether it be phishing attacks or straight up digital extortion, many threats exist. But the cyber post is here to educate its readers. Learn from experts and cybersecuirty industry vets on how you can better protect your data. Enjoy reading on how thieves and hackers employ tricks to steal your personal information. So then you can use this information to better protect your own identity.

Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency

0
May 13, 2025Ravie LakshmananCybercrime / Ransomware Moldovan law enforcement authorities have arrested a 45-year-old foreign man suspected of involvement in a series of ransomware attacks targeting Dutch companies in 2021. "He...

⚡ Weekly Recap: Zero-Day Exploits, Developer Malware, IoT Botnets, and AI-Powered Scams

0
May 12, 2025Ravie LakshmananCybersecurity / Hacking News What do a source code editor, a smart billboard, and a web server have in common? They've all become launchpads for attacks—because cybercriminals...

Qilin Ransomware Ranked Highest in April 2025 with 72 Data Leak Disclosures

0
May 08, 2025Ravie LakshmananThreat Intelligence / Ransomware Threat actors with ties to the Qilin ransomware family have leveraged malware known as SmokeLoader along with a previously undocumented .NET compiled loader...

Russian Hackers Using ClickFix Fake CAPTCHA to Deploy New LOSTKEYS Malware

0
The Russia-linked threat actor known as COLDRIVER has been observed distributing a new malware called LOSTKEYS as part of an espionage-focused campaign using ClickFix-like social engineering lures. "LOSTKEYS is capable...

Qilin Ransomware Ranked Highest in April 2025 with Over 45 Data Leak Disclosures

0
May 08, 2025Ravie LakshmananThreat Intelligence / Ransomware Threat actors with ties to the Qilin ransomware family have leveraged malware known as SmokeLoader along with a previously undocumented .NET compiled loader...

Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day to Breach U.S. Organization

0
Threat actors with links to the Play ransomware family exploited a recently patched security flaw in Microsoft Windows as a zero-day as part of an attack targeting an unnamed...

Entra ID Data Protection: Essential or Overkill?

0
Microsoft Entra ID (formerly Azure Active Directory) is the backbone of modern identity management, enabling secure access to the applications, data, and services your business relies on. As hybrid...

Third Parties and Machine Credentials: The Silent Drivers Behind 2025’s Worst Breaches

0
It wasn't ransomware headlines or zero-day exploits that stood out most in this year's Verizon 2025 Data Breach Investigations Report (DBIR) — it was what fueled them. Quietly, yet...

Automating Zero Trust in Healthcare: From Risk Scoring to Dynamic Policy Enforcement Without Network...

0
The Evolving Healthcare Cybersecurity Landscape Healthcare organizations face unprecedented cybersecurity challenges in 2025. With operational technology (OT) environments increasingly targeted and the convergence of IT and medical systems creating...

ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double Extortion

0
Apr 26, 2025Ravie LakshmananMalware / Vulnerability Cybersecurity researchers have detailed the activities of an initial access broker (IAB) dubbed ToyMaker that has been observed handing over access to double extortion...