Record-breaking Ransomware Attacks in March
March 2023 was the most active month for cyber attacks in recent years, according to a report by cybersecurity firm NCC Group.
March 2023 was the most active month for cyber attacks in recent years, according to a report by cybersecurity firm NCC Group.
The now-defunct Conti ransomware gang has been found to have collaborated with a threat actor likely affiliated with the FIN7 cybercrime group.
The Vice Society ransomware group has been found to be using a custom-built PowerShell script to automate the exfiltration of data from compromised networks.
St. Marys, a small community in Canada, fell victim to a ransomware attack, which cost just over $1.3 million, according to a report released by the Mayor.
The U.S. State Department is in discussions with Congress to establish official channels for assisting foreign countries in preventing from cyberattacks.
The Microsoft Threat Intelligence team has identified the MuddyWater APT group (also known as MERCURY) as responsible for a series of destructive attacks.
The site, which operated on both the dark and regular web, provided a range of criminal services including stolen credentials and tools for weaponizing data.
Mandiant has reported that an ALPHV/BlackCat ransomware affiliate is using three vulnerabilities in the Veritas Backup product.
Researchers at cybersecurity firm Check Point have discovered a new strain of ransomware that they have named Rorschach, the fastest threat of its kind.
The ransomware uses ChaCha20/ECDH encryption when encrypting files, and it will not append any extension, although this can change depending on the victim.
© 2025 | CyberMaterial | All rights reserved