Ransomware

Ransomware news and articles. Stay up to date with the latest cyber crime trends. Enjoy exciting stories of cybercriminals using online extortion. From hackers and organized crime to some nation state sponsored hackers. The Cyber Post brings you world wide cyber security news dedicated to ransomware.

In today’s digital age criminals are always lurking on the web. Whether it be phishing attacks or straight up digital extortion, many threats exist. But the cyber post is here to educate its readers. Learn from experts and cybersecuirty industry vets on how you can better protect your data. Enjoy reading on how thieves and hackers employ tricks to steal your personal information. So then you can use this information to better protect your own identity.

U.S. Charges Yemeni Hacker Behind Black Kingdom Ransomware Targeting 1,500 Systems

0
The U.S. Department of Justice (DoJ) on Thursday announced charges against a 36-year-old Yemeni national for allegedly deploying the Black Kingdom ransomware against global targets, including businesses, schools, and...

Hackers Abuse Russian Bulletproof Host Proton66 for Global Attacks and Malware Delivery

0
Apr 21, 2025Ravie LakshmananVulnerability / Threat Intelligence Cybersecurity researchers have disclosed a surge in "mass scanning, credential brute-forcing, and exploitation attempts" originating from IP addresses associated with a Russian bulletproof...

From Third-Party Vendors to U.S. Tariffs: The New Cyber Risks Facing Supply Chains

0
Introduction Cyber threats targeting supply chains have become a growing concern for businesses across industries. As companies continue to expand their reliance on third-party vendors, cloud-based services, and global logistics...

ResolverRAT Campaign Targets Healthcare, Pharma via Phishing and DLL Side-Loading

0
Cybersecurity researchers have discovered a new, sophisticated remote access trojan called ResolverRAT that has been observed in attacks targeting healthcare and pharmaceutical sectors. "The threat actor leverages fear-based lures delivered...

Initial Access Brokers Shift Tactics, Selling More for Less

0
What are IABs? Initial Access Brokers (IABs) specialize in gaining unauthorized entry into computer systems and networks, then selling that access to other cybercriminals. This division of labor allows IABs...

Microsoft Patches 125 Flaws Including Actively Exploited Windows CLFS Vulnerability

0
Apr 09, 2025Ravie LakshmananEndpoint Security / Vulnerability Microsoft has released security fixes to address a massive set of 125 flaws affecting its software products, including one vulnerability that it said...

Microsoft Patches 126 Flaws Including Actively Exploited Windows CLFS Vulnerability

0
Apr 09, 2025Ravie LakshmananEndpoint Security / Vulnerability Microsoft has released security fixes to address a massive set of 126 flaws affecting its software products, including one vulnerability that it said...

PipeMagic Trojan Exploits Windows Zero-Day Vulnerability to Deploy Ransomware

0
Apr 09, 2025Ravie LakshmananVulnerability / Ransomware Microsoft has revealed that a now-patched security flaw impacting the Windows Common Log File System (CLFS) was exploited as a zero-day in ransomware attacks...

FIN7 Deploys Anubis Backdoor to Hijack Windows Systems via Compromised SharePoint Sites

0
Apr 02, 2025Ravie LakshmananRansomware / Email Security The financially motivated threat actor known as FIN7 has been linked to a Python-based backdoor called Anubis (not to be confused with an...

⚡ Weekly Recap: Chrome 0-Day, IngressNightmare, Solar Bugs, DNS Tactics, and More

0
Mar 31, 2025Ravie LakshmananThreat Intelligence / Cybersecurity Every week, someone somewhere slips up—and threat actors slip in. A misconfigured setting, an overlooked vulnerability, or a too-convenient cloud tool becomes the...