Latest news

Western Alliance Bank data breach: 21,899 customers impacted
Ransomware

Western Alliance Bank data breach: 21,899 customers impacted

18 March 2025 securebulletin.com

The recent data breach at Western Alliance Bank underscores a growing concern in the cybersecurity landscape: the risks posed by...
Akira ransomware’s ingenious IoT gambit: when webcams become cyberweapons
Ransomware

Akira ransomware’s ingenious IoT gambit: when webcams become cyberweapons

9 March 2025 securebulletin.com

Akira group demonstrated how unsecured IoT devices can bypass enterprise-grade defenses. In a case analyzed by S-RM, attackers weaponized a...
The CrazyHunter ransomware attack on Makai Hospital
Ransomware

The CrazyHunter ransomware attack on Makai Hospital

9 March 2025 securebulletin.com

On February 9, 2025, Makai Memorial Hospital in Taiwan became the latest victim of a devastating ransomware campaign orchestrated by...
Fog’s dubious GitLab claims: investigation on instances
Ransomware

Fog’s dubious GitLab claims: investigation on instances

6 March 2025 securebulletin.com

One name that has been gaining traction since late January is Fog, a ransomware operation that has been particularly vocal...
Black Basta and CACTUS ransomware: shared BackConnect module signals affiliate transition
Ransomware

Black Basta and CACTUS ransomware: shared BackConnect module signals affiliate transition

4 March 2025 securebulletin.com

Recent analysis has revealed a significant overlap in the tactics, techniques, and procedures (TTPs) employed by the Black Basta and...
Anubis: new ransomware threat
Ransomware

Anubis: new ransomware threat

26 February 2025 securebulletin.com

A new player has emerged in the ransomware landscape: Anubis. This group, first observed in December 2024, is quickly making...
Ghost Ransomware: an analysis of tactics, targets, and techniques
Ransomware

Ghost Ransomware: an analysis of tactics, targets, and techniques

23 February 2025 dark6

A joint advisory from CISA, the FBI, and the MS-ISAC sheds light on the activities of the Ghost ransomware gang,...
Fog ransomware: a deep dive into its tactics and targets
Ransomware

Fog ransomware: a deep dive into its tactics and targets

14 February 2025 securebulletin.com

Okay, I can do that! Here’s a short, discursive article about Fog Ransomware based on the provided document, written in...
Ransomware targets ESXi systems to tunnel traffic to C2 infrastructure using SSH
Ransomware

Ransomware targets ESXi systems to tunnel traffic to C2 infrastructure using SSH

28 January 2025 securebulletin.com

Cybersecurity analysts have recently highlighted a concerning trend in ransomware attacks targeting ESXi systems. These attacks are not only compromising...
Identified a Python-based backdoor used by RansomHub affiliate to spread encryptors
Ransomware

Identified a Python-based backdoor used by RansomHub affiliate to spread encryptors

20 January 2025 dark6

In a recent incident response analysis, GuidePoint Security has uncovered a sophisticated use of a Python-based backdoor by a threat...
Blacon High School forced to close after ‘ransomware attack’
Ransomware

Blacon High School forced to close after ‘ransomware attack’

20 January 2025 securebulletin.com

Blacon High School in Cheshire has announced a temporary closure following a significant ransomware attack that occurred on Friday, January...
Amazon S3 buckets targeted by new ransomware attacks
Ransomware

Amazon S3 buckets targeted by new ransomware attacks

13 January 2025 securebulletin.com

A new wave of ransomware attacks has emerged, targeting Amazon Web Services (AWS) by exploiting its Server-Side Encryption with Customer...