This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The group has been active since March 2022, it focused on small and medium-sized businesses in multiple industries, including finance, manufacturing, businessservices, and IT.
. “These technologies are primarily used by small- to medium-sized businesses for their ease in enabling website development with integrations for eCommerce, website content management, and businessservice offerings.”
The 8Base ransomware group has been active since March 2022, it focused on small and medium-size businesses in multiple industries, including finance, manufacturing, businessservices, and IT. Source Nation Thailand The gang compromised at least 17 Swiss companies using the Phobos ransomware between April 2023 and October 2024.
The group has targeted at least 150 organizations, focusing on sectors like healthcare, hospitality, technology, businessservices, and government. .” Stormous is a pro-Russia ransomware group active since early 2022. It uses a double extortion model. Most of the victims are in Spain, the U.S., UAE, France, and Brazil.
Businessservices firm Morley was hit by a ransomware attack that may have exposed data of +500,000 individuals. Businessservices company Morley was victim of a ransomware attack that may have resulted in a data breach impacting more than 500,000 individuals.
Experts warn of a surge in NetSupport RAT attacks against education, government, and businessservices sectors. The most impacted sectors are education, government, and businessservices. NetSupport RAT is a remote control and desktop management software developed by NetSupport Ltd.
The TinyNuke malware is back and now was used in attacks aimed at French users working in manufacturing, technology, construction, and businessservices. “In the most recent campaigns, the threat actor uses invoice-themed lures purporting to be logistics, transportation, or businessservices entities.”
The group has been active since March 2022, it focused on small and medium-size businesses in multiple industries, including finance, manufacturing, businessservices, and IT. Security experts attributed 67 attacks to the group in May 2023, most of the victims are in the U.S. and Brazil.
” The victims of the Lockfile ransomware gang are in the manufacturing, financial services, engineering, legal, businessservices, and travel and tourism sectors. It is not clear how the attackers gain initial access to the Microsoft Exchange Servers.”
The group has been active since March 2022, it focused on small and medium-size businesses in multiple industries, including finance, manufacturing, businessservices, and IT. ” Security experts attributed 67 attacks to the group in May 2023, most of the victims are in the U.S. and Brazil.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content