Cohesity Research Reveals Most Companies Pay Millions in Ransoms

January 30, 2024 at 05:02PM Cohesity’s research reveals the prevalence of cyberattacks, leading companies to break ‘do not pay’ policies due to data recovery deficiencies. The study of 900+ IT and Security decision-makers shows a grim outlook for cyberattacks, with 79% being victims of ransomware. Companies require over 24 hours for data recovery, leading to … Read more

AMD, Apple, Qualcomm GPUs leak AI data in LeftoverLocals attacks

January 17, 2024 at 10:36AM The ‘LeftoverLocals’ vulnerability affects GPUs from AMD, Apple, Qualcomm, and Imagination Technologies, allowing data retrieval from local memory. Discovered by Trail of Bits researchers Tyler Sorensen and Heidy Khlaaf, it exploits incomplete memory isolation in GPU frameworks, enabling unauthorized data access. Mitigation efforts are underway, including patching and recommending automatic … Read more

New Black Basta decryptor exploits ransomware flaw to recover files

December 30, 2023 at 10:25AM Security Research Labs (SRLabs) has developed a decryptor called the “Black Basta Buster” that allows victims of the Black Basta ransomware to potentially recover their files for free, exploiting a flaw in the encryption algorithm used by the ransomware gang. However, the developers have since fixed the bug, rendering the … Read more

US Gov Disrupts BlackCat Ransomware Operation; FBI Releases Decryption Tool

December 19, 2023 at 01:57PM The US government disrupted the BlackCat ransomware-as-a-service, providing a decryption tool for affected organizations. The operation, also known as ALPHV, extorted around $68 million. Infiltrating the group, officials seized websites and revealed the gang’s tactics. BlackCat targeted sensitive data, including healthcare and critical infrastructure installations, causing widespread disruption. Key takeaways … Read more

How the FBI seized BlackCat (ALPHV) ransomware’s servers

December 19, 2023 at 12:33PM The US Department of Justice seized the ALPHV/BlackCat ransomware operation’s websites and created a decryptor to assist around 500 affected companies in recovering their data for free. By utilizing a confidential human source, the FBI accessed the ransomware gang’s affiliate panel to obtain private decryption keys. This operation is the … Read more

New Ransomware Group Emerges with Hive’s Source Code and Infrastructure

November 13, 2023 at 07:48AM Hunters International, a new ransomware group, has acquired the source code and infrastructure from the now-dismantled Hive operation to jumpstart its own efforts. Despite similarities, Hunters International claims to have purchased the Hive source code and website. The group focuses on data exfiltration rather than encryption, targeting victims for data … Read more