Die Linke meldet einen Cyberangriff auf die eigene IT-Infrastruktur. Offenbar sind auch schon die Verursacher ermittelt worden. (Cybercrime, Datenschutz)
Ransomware dient längst nicht mehr nur der Erpressung. Staatlich unterstützte Akteure nutzen sie zunehmend für Spionage, Datenmanipulation und strategische Destabilisierung. Während Unternehmen sich gegen Verschlüsselung schützen, kopieren Angreifer unbemerkt Daten oder manipulieren sie. Die Folgen reichen weit über Lösegeldzahlungen hinaus.
U.S. State and Local Government Under Ransomware: 2025–2026 Trend Analysis U.S. state and local government organizations remain under growing pressure from ransomware, making the issue a major cybersecurity and public service concern in 2025 and 2026. From city administrations and county offices to school districts, courts, and public safety agencies, these institutions rely on connected […]
Threat actors bypass security tools and use AI to launch faster ransomware attacks that exploit valid credentials and target data.
The ransomware gang, known for double-extortion attacks, had access to a critical Cisco firewall vulnerability weeks before it was publicly disclosed.
Ransomware actors are ditching Cobalt Strike in favor of native Windows tools, as payment rates hit record lows and data theft surges.
In a recent attack, the group showcased stealthier cross-network activity, thanks to its use of a new BYOVD technique and other tools.
Summary Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to […]