CACTUS Qlik Ransomware: Vulnerabilities Exploited

A cyberattack campaign dubbed the CACTUS Qlik Ransomware has become prominent in ransomware attacks on BI systems. Researchers have warned of threat actors exploiting three Qlik security vulnerabilities to target different organizations ...
DORA, regulatory, LockBit ransomware DOJ reward

Black Basta Extortion Group Racks Up $107 Million in Ransom Payments

Anyone who wonders why the threat of ransomware continues to grow need only to take a look at Black Basta, the prolific extortion gang that last year likely rose from the ashes ...
Security Boulevard
ransomware, backups, LockBit ransomware Federal Reserve

Akira Ransomware Racks Up at Least 63 Victims in 4 Months

The Akira ransomware group, which launched four months ago, has racked up at least 63 victims, most of which are small and midsize businesses, according to a new report from Arctic Wolf ...
Security Boulevard
BlackByte Stormous Ransomware

BlackByte is Back and Acting a Lot Like LockBit

Like many ransomware strains, BlackByte has reemerged after a brief hiatus—and in its second iteration has already taken to hacker forums to push a new Tor data leak site that taps some ...
Security Boulevard
Rubrik security OpenText insurance ransom ShinyHunters ransomware

The Million-Dollar Question: To Pay or Not to Pay Ransom?

Ransomware is one of the most serious threats to businesses today. In fact, a recent survey found that 85% of enterprises are more concerned about the prospect of ransomware attacks than any ...
Security Boulevard
ransomware , insurance, payouts, security, Babuk Locker

Defending Against Modern Ransomware Tactics

Ransomware gangs are continuing to evolve new tactics and techniques, and organizations need to be better prepared to defend against them in 2022. In the business of extorting money from victims, bad ...
Security Boulevard
A Brief History of Ransomware Evolution

A Brief History of Ransomware Evolution

Wondering where the scourge of ransomware attacks currently stands? In a recent report titled Ransomware: The True Cost to Business, we noted that ransomware attacks occur about every 11 seconds. That rate ...
Which Data Do Ransomware Attackers Target for Double Extortion?

Which Data Do Ransomware Attackers Target for Double Extortion?

Double extortion is one of the most prevalent ransomware tactics today. The attackers first exfiltrate sensitive information from their target before launching the ransomware encryption routine. The threat actor then demands a ...