Results for: ransomware

Cerber ransomware targets Microsoft Office 365 users
First identified back in March, Cerber ransomware made headlines again recently after reportedly targeting Microsoft Office 365 users through a large-scale zero-day attack. Outside estimates say the email was sent to millions of Office 365 users and that it took...

Ransomware exposes poor data management hygiene
As ransomware attacks continue to proliferate, the soft underbelly of IT — how organizations often manage their data in a cavalier manner — is finally being exposed. Ransomware combines social engineering techniques, malware, and encryption to take an organization’s data hostage. As...

Samsam and Petya: The New Wave of Ransomware
Malware development, like any other area in IT, is a hotbed of innovation and change. At the forefront of this trend are the groups responsible for developing ransomware applications such as TeslaCrypt and Cryptowall. Today’s news brings two new challengers:...

TeslaCrypt 4.0 ransomware ups the ante with unbreakable encryption
When TeslaCrypt first arrived on the ransomware scene about a year ago, it seemed like a CryptoLocker copycat with a few new tricks, such as renaming existing files, deleting browser history to hide the source of the infection, and a...

KeRanger brings ransomware to the Mac
Not too long ago one of the benefits of using a Macintosh for work was that there wasn’t enough of these systems in place to make it worthwhile for hackers to target them. Fast forward to today, and the growing...

Cyber insurance: A must for MSPs
If you don’t carry cyber insurance yet, you may want to reconsider. Statistics show that if you are an MSP owner, you probably already have it, with 91.7 percent of managed service providers (MSPs) carry cyber insurance specifically for their operations,...

Cybersecurity Threat Advisory: SAP critical vulnerabilities
SAP has released patches to address a second vulnerability, CVE-2025-42999, affecting its SAP NetWeaver tool. The vulnerability involves a privilege escalation issue that, when chained with SAP’s CVE-2025-31324 vulnerability (unauthenticated file upload flaw in SAP NetWeaver Visual Composer), can enable...

Cybersecurity Threat Advisory: Critical Commvault Command Center vulnerability
Commvault Command Center has been impacted by a critical security vulnerability, CVE-2025-34028, with a CVSS score of 10. This vulnerability enables remote code execution (RCE). Review the details of this Cybersecurity Threat Advisory to minimize the risk from this threat....

Cybersecurity Threat Advisory: BYOI endpoint detection and response bypass
A sophisticated attack technique known as “Bring Your Own Installer” (BYOI) has been employed by threat actors to bypass SentinelOne’s tamper protection, facilitating the deployment of Babuk ransomware. This method leverages legitimate installers to execute malicious payloads, effectively evading endpoint...