Analysis
Akira (or Akira Ransomware) is fast becoming one of the fastest growing ransomware families, utilizing a double extortion tactic, a Ransomware-as-a-Service (RaaS) distribution model and unique payment options.
Report
Password-related cyberattacks through malware infections are at the top of the list of the most popular attacks. Nearly 31 percent of all security breaches analyzed by the Verizon DBIR team since 2013 have been related to stolen credentials.
New malware discovered
A new threat has emerged on the cybercrime scene that is specifically targeting ATMs in Europe and could therefore endanger the entire banking industry. The malware, known as “EU ATM Malware”, was recently offered for sale on a hacker forum.
10 international arrest warrants, 4 arrests
Investigators are talking about the biggest strike against cyber criminals: more than 100 servers have been confiscated and 1300 domains put out of operation in an operation in several countries worldwide.
Akamai study
Akamai Technologies, provider of web, cloud and security solutions, has presented its new “State of the Internet” report. This shows that the number of DDoS attacks is increasing most rapidly in the EMEA region (Europe, Middle East, Africa).
Onapsis study
Onapsis publishes its new study “ERP security in times of AI-supported ransomware”.
The results are based on a survey of 500 cybersecurity decision-makers in companies with 500 or more employees in the DACH region and the UK.
The Sophos X-Ops team has disclosed a new attack variant of the Qilin ransomware group.
As part of a recent investigation into a Qilin ransomware attack, the Sophos X-Ops team discovered that the attackers stole credentials stored in Google Chrome browsers on certain network endpoints.
After dismantling
The takedown of the LockBit ransomware group in February 2024 shook the cybercrime world.
According to WithSecure’s new report, LockBit is now in a rebuilding phase, with clear signs of a planned comeback.
Comment: Ransomware analysis
The ransomware landscape remains dynamic and fast-moving.
This is demonstrated by the significant increase in ransomware attacks and their impact in the second quarter (April-June) of 2024.
The unmasking of the Styx Stealer
Check Point encountered a curious malware case: The security researchers at Check Point Research (CPR) discovered that the developer of the new malware Styx Stealer made a serious mistake during debugging that leaked data from his computer.
Security breach or hysteria?
An alleged hack at data broker National Public Data (NPD) made headlines this week for potentially exposing billions of social security numbers. Real leak or hysteria?
Industrial Control Systems (ICS)
Thousands of industrial control systems (ICS) in the USA and the UK are vulnerable to cyber attacks. Critical infrastructure, such as the water supply, is also affected.
The latest analysis from Cato CTRL reveals alarming developments in the cybersecurity landscape. The threat actor “IntelBroker” emerges as a central figure in selling stolen data and source code, and also plays a prominent role in hacking forums.
Advanced Persistent Threats (APT)
The FBI has launched an investigation after Donald Trump’s presidential campaign claimed to have been attacked by Iranian hackers. Proofpoint security researcher Joshua Miller explains the possible background.
Events
Veranstaltungen
Most read articles.
7. August 2025