A ransomware attack on a healthcare IT solutions provider has disrupted access to patients’ electronic health records (EHRs) ...
IntroductionIn February 2022, BlackBasta emerged as a successor to Conti ransomware and quickly rose to prominence. BlackBasta was operational for three years until February 2025 when their internal ...
AttackIQ has released a new attack graph that emulates the behaviors of NightSpire Ransomware, a financially motivated ...
Ransomware attacks encrypt or lock critical PV system data and control platforms, preventing operators from accessing or managing their assets until a ransom is paid. These attacks can disrupt ...
Organisations delusional about ransomware recovery capability By Chris Tredger, Technology Portals editor, ITWebJohannesburg, 17 Apr 2026Anand Eswaran, CEO at Veeam. There is a growing disconnect ...
Threat actors are abusing the QEMU machine emulator to hide their malicious activity within virtualized environments.
The Payouts King ransomware is using the QEMU emulator as a reverse SSH backdoor to run hidden virtual machines on ...
In February 2026, the University of Mississippi Medical Center (UMMC) fell victim to a ransomware attack. The incident took the Epic electronic health record system offline across 35 clinics and more ...
Cybercrime has matured into a disciplined, leverage-driven business. Organizations need to respond with equal discipline.
From the FBI breach to the DarkSword iPhone exploit, these are the biggest cyber attacks and security failures that have ...
Ransomware is still often discussed as if it is mainly a malware problem. That view is outdated. For modern organisations, ransomware is now a recovery prob ...
A recent report from Microsoft warns about two active cybersecurity threats: a fast-moving ransomware campaign and a Russian espionage operation that abuses small office and home office routers to ...