Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 5 / 23
452 résultats taggé Ransomware  ✕
Victime d'une cyberattaque début décembre, VidyMed a restauré les données ciblées (update) https://www.ictjournal.ch/news/2025-01-14/victime-dune-cyberattaque-debut-decembre-vidymed-a-restaure-les-donnees-ciblees
14/01/2025 22:32:36
QRCode
archive.org
thumbnail

Ciblée par une cyberattaque début décembre, VidyMed avait directement coupé l’accès aux systèmes pour contenir l’im

ictjournal FR CH Suisse 2025 Vidymed ransomware cyberattaque restauration données
Ransomware abuses Amazon AWS feature to encrypt S3 buckets https://www.bleepingcomputer.com/news/security/ransomware-abuses-amazon-aws-feature-to-encrypt-s3-buckets/
13/01/2025 20:12:07
QRCode
archive.org
thumbnail

A new ransomware campaign encrypts Amazon S3 buckets using AWS's Server-Side Encryption with Customer Provided Keys (SSE-C) known only to the threat actor, demanding ransoms to receive the decryption key.

bleepingcomputer EN 2025 Encryption Ransomware Computer S3 Amazon AES Security AWS
FunkSec – Alleged Top Ransomware Group Powered by AI https://research.checkpoint.com/2025/funksec-alleged-top-ransomware-group-powered-by-ai/
10/01/2025 17:41:47
QRCode
archive.org
thumbnail
  • The FunkSec ransomware group emerged in late 2024 and published over 85 victims in December, surpassing every other ransomware group that month.
  • FunkSec operators appear to use AI-assisted malware development which can enable even inexperienced actors to quickly produce and refine advanced tools.
  • The group’s activities straddle the line between hacktivism and cybercrime, complicating efforts to understand their true motivations.
  • Many of the group’s leaked datasets are recycled from previous hacktivism campaigns, raising doubts about the authenticity of their disclosures.
  • Current methods of assessing ransomware group threats often rely on the actors’ own claims, highlighting the need for more objective evaluation techniques.
checkpoint EN 2024 FunkSec analysis ransomware
Casio says hackers stole personal data of 8,500 people during October ransomware attack https://techcrunch.com/2025/01/08/casio-says-hackers-stole-personal-data-of-8500-people-during-october-ransomware-attack/
08/01/2025 12:29:13
QRCode
archive.org
thumbnail

The Japanese electronics giant says it did not negotiate with the hackers responsible for the attack.

techcrunch EN 2025 Casio Ransomware data-leak
Rhode Island warns of cybercriminals leaking stolen state files as Deloitte works to restore system https://therecord.media/rhode-island-data-breach-deloitte
04/01/2025 12:14:37
QRCode
archive.org
thumbnail

Rhode Island officials said they're still analyzing the impact of a ransomware gang's breach of state health and social services systems. Some are still down.

therecord.media EN 2025 Rhode-Island data-leak stolen data ransomware
Clop ransomware is now extorting 66 Cleo data-theft victims https://www.bleepingcomputer.com/news/security/clop-ransomware-is-now-extorting-66-cleo-data-theft-victims/
28/12/2024 11:58:18
QRCode
archive.org
thumbnail

The Clop ransomware gang started to extort victims of its Cleo data theft attacks and announced on its dark web portal that 66 companies have 48 hours to respond to the demands.

bleepingcomputer EN 2024 Cleo Clop Double-Extortion Extortion Ransomware
LockBit Ransomware Group Plots Comeback With 4.0 Release https://thecyberexpress.com/lockbit-ransomware-comeback-lockbit-4-0/
27/12/2024 11:56:17
QRCode
archive.org
thumbnail

The LockBit ransomware group will soon launch a comeback with the planned release of LockBit 4.0 in February 2025, Cyble

thecyberexpress EN 2024 LockBit ransomware LockBit4.0 comeback announce RaaS
Inside Operation Destabilise: How a ransomware investigation linked Russian money laundering and street-level drug dealing https://therecord.media/operation-destabilise-money-laundering-investigation-uk-nca
23/12/2024 13:44:58
QRCode
archive.org
thumbnail

U.K. investigators tell the story of how examining a cybercrime group's extortion funds helped to unravel a money-laundering network reaching from the illegal drug trade to Moscow's elite.

therecord.media EN 2024 Operation-Destabilise ransomware Russia UK cybercrime money-laundering
Medion hack? BlackBasta ransomware has allegedly copied 1.5 TB of data | heise online https://www.heise.de/en/news/Medion-hack-BlackBasta-ransomware-has-allegedly-copied-1-5-TB-of-data-10216148.html
21/12/2024 00:00:48
QRCode
archive.org
thumbnail

Cyber criminals claim to have successfully attacked Medion, a distributor of electronic products.

heise EN 2024 BlackBasta Cyberangriff Hacking MEDION Ransomware
Ascension: Health data of 5.6 million stolen in ransomware attack https://www.bleepingcomputer.com/news/security/ascension-health-data-of-56-million-stolen-in-ransomware-attack/
20/12/2024 13:09:00
QRCode
archive.org
thumbnail

​Ascension, one of the largest private U.S. healthcare systems, is notifying over 5.6 million patients and employees that their personal and health data was stolen in a May cyberattack linked to the Black Basta ransomware operation.

bleepingcomputer EN 2024 Ascension Data-Breach Healthcare Ransomware Security InfoSec Computer-Security
NotLockBit: A Deep Dive Into the New Ransomware Threat | Qualys Security Blog https://blog.qualys.com/vulnerabilities-threat-research/2024/12/18/notlockbit-a-deep-dive-into-the-new-ransomware-threat
20/12/2024 09:34:29
QRCode
archive.org
thumbnail

NotLockBit is a new and emerging ransomware family that actively mimics the behavior and tactics of the well-known LockBit ransomware.

qualys EN 2024 NotLockBit Ransomware analysis
https://www.forescout.com/blog/draytek-routers-exploited-in-massive-ransomware-campaign-analysis-and-recommendations/ https://www.forescout.com/blog/draytek-routers-exploited-in-massive-ransomware-campaign-analysis-and-recommendations/
16/12/2024 09:24:00
QRCode
archive.org
  • Our 2024 Dray:Break report revealed 14 new vulnerabilities in DrayTek devices
    *See our upcoming presentation at Black Hat Europe for more details
  • PRODAFT shared threat intelligence from 2023 on a ransomware campaign exploiting DrayTek devices
  • This is the first time this campaign is discussed publicly
  • Our analysis shows sophisticated attack workflows to deploy ransomware including possible:
    • Zero-day vulnerabilities
    • Credential harvesting and password cracking
      VPN and tunneling abuse
forescout en 2024 draytek ALPHV ransomware
Ransomware hackers target NHS hospitals with new cyberattacks https://techcrunch.com/2024/12/04/ransomware-hackers-target-nhs-hospitals-with-new-cyberattacks/
09/12/2024 11:03:43
QRCode
archive.org
thumbnail

Two NHS trusts in England have been hacked in recent weeks, the latest attacks to hit the national health service.

techcrunch EN 2024 INCRansomware NHS UK health ransomware
Black Basta ransomware gang hit BT Group https://securityaffairs.com/171668/breaking-news/black-basta-ransomware-attack-bt-group.html
05/12/2024 16:54:18
QRCode
archive.org
thumbnail

BT Group (formerly British Telecom)'s Conferencing division shut down some of its servers following a Black Basta ransomware attack.

securityaffairs EN 2024 BT Group BlackBasta ransomware
Energy industry contractor says ransomware attack has limited access to IT systems | The Record from Recorded Future News https://therecord.media/energy-industry-contractor-ransomware-disruption
03/12/2024 08:05:50
QRCode
archive.org
thumbnail

The company, ENGlobal Corporation, has restricted employee access to its IT system, limiting it to only essential business operations.

therecord.media EN 2024 ENGlobal Corporation ransomware attack
Starbucks, grocery stores impacted by Blue Yonder ransomware attack - Help Net Security https://www.helpnetsecurity.com/2024/11/26/starbucks-blue-yonder-ransomware-attack/
01/12/2024 12:14:05
QRCode
archive.org
thumbnail

Supply chain management SaaS vendor Blue Yonder experienced a ransomware attack that impacted big companies like Starbucks.

helpnetsecurity EN 2024 Starbucks BlueYonder ransomware
Attacco ransomware al Bologna FC, rubati migliaia di documenti (anche sui calciatori) | Wired Italia https://www.wired.it/article/attacco-ransomware-bologna-fc/
28/11/2024 10:51:40
QRCode
archive.org
thumbnail

I pirati del gruppo RansomHub pubblicano su Dark Web alcuni dei documenti sottratti e chiedono al club di Serie A di pagare un riscatto

wired it 2024 ransomware calcio BolognaFC RansomHub
INPS Servizi sotto attacco ransomware. Dati a rischio e sito irraggiungibile | DDay.it https://www.dday.it/redazione/51178/inps-servizi-sotto-attacco-ransomware-dati-a-rischio-e-sito-irraggiungibile
21/11/2024 14:54:48
QRCode
archive.org
thumbnail

L’attacco è avvenuto il 18 novembre ma è stato comunicato il giorno dopo attraverso l’avviso di un ente che si serve di INPS Servizi

dday IT 1014 Italia INPS Servizi ransomware
Office of Public Affairs | Phobos Ransomware Administrator Extradited from South Korea to Face Cybercrime Charge https://www.justice.gov/opa/pr/phobos-ransomware-administrator-extradited-south-korea-face-cybercrime-charges
20/11/2024 21:59:45
QRCode
archive.org

The Justice Department unsealed criminal charges today against Evgenii Ptitsyn, 42, a Russian national, for allegedly administering the sale, distribution, and operation of Phobos ransomware.

justice.gov US 2024 EN Phobos Ransomware Administrator Extradited US
The State of Cloud Ransomware in 2024 https://www.sentinelone.com/blog/the-state-of-cloud-ransomware-in-2024/
14/11/2024 16:23:36
QRCode
archive.org
thumbnail

In this new report, learn how threat actors are leveraging cloud services to target web services with ransomware attackers.

sentinelone EN 2024 Ransomware report cloud services
page 5 / 23
4934 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn