资讯

A recently discovered ransomware strain called HybridPetya can bypass the UEFI Secure Boot feature to install a malicious ...
USB drives, external HDDs, and memory cards—remains the go-to for transferring and backing up data. But these devices are ...
PromptLock is only a prototype of LLM-orchestrated ransomware, but hackers already use AI in file encryption and extortion ...
HybridPetya ransomware exploits CVE-2024-7344 to bypass UEFI Secure Boot, encrypts NTFS MFT, and demands $1,000 Bitcoin ...
ESET Research has discovered HybridPetya, a copycat of the infamous Petya/NotPetya malware that adds the capability of ...
The latest research into cybercrime and those behind it illustrates why businesses must quickly adapt to the rising tide of ...
Ransomware has become one of the most devastating forms of cybercrime in the modern era. From hospitals forced to cancel surgeries to global supply chains brought to a standstill, ransomware doesn’t ...
AttackIQ has released a new attack graph that emulates the behaviors exhibited by Warlock ransomware, which emerged in June 2025. Beginning in July, Warlock operators have primarily targeted ...
Cybercriminals are increasingly using generative AI tools to fuel their attacks, with new research finding instances of AI ...
As the attack surface expands and the threat landscape grows more complex, it’s time to consider whether your data protection ...
The Crypto24 ransomware group has been using custom utilities to evade security solutions on breached networks, exfiltrate data, and encrypt files. The threat group's earliest activity was reported on ...