How will the transition of the program to other dimensions affect the overall cybersecurity landscape?
A cybercriminal under the nickname "salfetka" announced the sale of the source code of the ransomware program to INC Ransom. This program was launched in August 2023 and has been operating...
Cybercriminalists usually unravel the traces of hacker activity, but sometimes resist attacks that continue to develop "here and now". What might this look like on the example of a ransomware attack?
A fairly common situation: IT department specialists detect an attack by a ransomware program...
How will the latest attempts of hackers to revive their evil empire turn out?
Recently, we reported that the infrastructure of the LockBit hacker group, widely known for its ransomware attacks, was eliminated as a result of Operation Kronos, conducted by the British authorities. This event was...
Experts identified a classic attack strategy and shared it with all organizations.
In a joint statement, the Federal Bureau of Investigation (FBI) and the US Cybersecurity and Infrastructure Security Agency (CISA) provided new information about tools used by attackers related to the AvosLocker...