Ransomware threat actors tracked as Velvet Tempest are using the ClickFix technique and legitimate Windows utilities to deploy the DonutLoader malware and the CastleRAT backdoor.
The cybercriminal group known as LockBit has released an improved 5.0 version of its ransomware (LockBit 5.0), which is “significantly more dangerous,” warns Trend Micro. The malware now attacks ...
Windows endpoint management company Aiden Technologies Inc. today announced the launch of AidenRescue, a new solution for recovering and rebuilding Windows devices after a ransomware attack or other ...
The Qilin ransomware operation was spotted executing Linux encryptors in Windows using Windows Subsystem for Linux (WSL) to evade detection by traditional security tools. The ransomware first launched ...
Microsoft's blog recently gave a firm warning: unsupported systems aren't just outdated, they're unprotected. That message targets anyone still using Windows 10, and it's serious. In Microsoft's ...
Forbes contributors publish independent expert analyses and insights. Davey Winder is a veteran cybersecurity writer, hacker and analyst. Update, July 28, 2025: This story, originally published on ...
The Quilin ransomware group has attacked Windows hosts using a Linux-based binary in a cross-platform attack that can evade Windows-centric detections and security solutions, including conventional ...
Wazuh has advised its users on “DOGE Big Balls,” a recently identified ransomware variant linked to the “Fog” ransomware group. First observed in early 2025, DOGE Big Balls gained notoriety after ...
Researchers from cybersecurity company ESET have detected a new ransomware called HybridPetya, which is similar to the infamous Petya and NotPetya malware. Like its predecessors, the malware targets ...
As ransomware attacks continue, a few key groups have inflicted some of the greatest damage to their victims. Use this guide to learn about their targets and tactics as well as how to safeguard ...
Researchers revealed a Phorpiex-distributed phishing campaign using malicious LNK files to deploy Global Group ransomware designed to operate entirely offline. Forcepoint X-Labs researchers have ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results