Results for: ransomware

Ransomware exposes poor data management hygiene
As ransomware attacks continue to proliferate, the soft underbelly of IT — how organizations often manage their data in a cavalier manner — is finally being exposed. Ransomware combines social engineering techniques, malware, and encryption to take an organization’s data hostage. As...

Samsam and Petya: The New Wave of Ransomware
Malware development, like any other area in IT, is a hotbed of innovation and change. At the forefront of this trend are the groups responsible for developing ransomware applications such as TeslaCrypt and Cryptowall. Today’s news brings two new challengers:...

TeslaCrypt 4.0 ransomware ups the ante with unbreakable encryption
When TeslaCrypt first arrived on the ransomware scene about a year ago, it seemed like a CryptoLocker copycat with a few new tricks, such as renaming existing files, deleting browser history to hide the source of the infection, and a...

KeRanger brings ransomware to the Mac
Not too long ago one of the benefits of using a Macintosh for work was that there wasn’t enough of these systems in place to make it worthwhile for hackers to target them. Fast forward to today, and the growing...

Cybersecurity 2025 trends: Key emerging threats
Welcome to part two of our deep dive into 2025’s cybersecurity landscape. As highlighted in part one of this blog, generative artificial intelligence (GenAI) and supply chain vulnerabilities are at the forefront of cyberthreats. We consulted with other industry experts...

Cybersecurity Threat Advisory: Critical CentreStack and Triofox vulnerability
A critical security vulnerability, tracked as CVE-2025-30406, has been disclosed in Gladinet’s CentreStack and Triofox file-sharing platforms. According to reports, this flaw arises from the presence of hardcoded administrative credentials embedded in default software builds. Attackers can use these credentials...

Cybersecurity Threat Advisory: Windows zero-day vulnerability actively exploited
A newly discovered Windows zero-day vulnerability, CVE-2025-29824, is actively exploited by a targeted ransomware campaign involving the PipeMagic trojan. Continue reading this Cybersecurity Threat Advisory to limit the impact of this vulnerability. What is the threat? CVE-2025-29824 is critical flaw...

Cybersecurity 2025 trends: GenAI and supply chains top of the threat list
It is hard to believe that we are now over three months into 2025. With Q1 in the books, we have approached the one-third of the year mark. This is a good time to pause and survey stakeholders and cybersecurity...

Cybersecurity Threat Advisory: Apache RCE vulnerability
A critical remote code execution (RCE) vulnerability in Apache Parquet, identified as CVE-2025-30065, with a CVSS score of 10.0, has been discovered. Continue reading this Cybersecurity Threat Advisory to learn how to effectively mitigate your risks. What is the threat?...