More

    Exploits

    Report: Ransomware Attackers ‘More Systematic,’ Claims Become Costlier

    Article 0 Comments A portfolio claims analysis shared by Resilience, a cyber risk solutions company, showed the year-over-year average cost of individual ransomware attacks rose by...

    Ransomware Payments Plummet in Education Amid Enhanced Resiliency

    Ransomware demands and payments have plummeted in the education sector in the past year amid improved resilience and recovery capabilities, according to a new...

    U.S. indicts Ukrainian national for hundreds of ransomware attacks using multiple variants

    The Department of Justice unsealed an indictment against a Ukrainian national alleged to be central to a ransomware campaign affecting hundreds of companies worldwide.  Volodymyr...

    Advanced GPUGate malware campaign examined

    Western European IT and software development firms have been compromised with the GPUGate malware as part of a sophisticated attack campaign involving Google Ads...

    Huge malware attack targeting crypto exposes DeFi’s Achilles heel

    The Decentralised Hackers poisoned JavaScript packages with crypto-stealing malware. The large scale attack exposes a DeFi weak point. The attackers have only stolen a minimal amount so...

    New RatOn Android Malware Targets Banking Apps and Crypto Wallets via NFC Attacks

    In the ever-evolving world of cybersecurity threats, a new strain of Android malware named RatOn has emerged as a sophisticated tool for financial fraud,...

    Russian Threat Group Targets Microsoft Outlook With Malware

    Research has identified a new Outlook backdoor linked to a Russian-linked persistent threat group. 

    Why Ransomware Victims Still Pay — and How to Avoid the Ransom Altogether  

    Ransomware victims still pay despite falling payouts. Learn why—and how Morphisec helps organizations stop attacks before ransom demands ever arrive. 

    Open Source Community Thwarts Massive npm Supply Chain Attack

    A potential npm supply chain disaster was averted in record time after attackers took over a verified developer’s credentials. On September 8, Josh Junon, a...

    Latest articles