❌

Normal view

There are new articles available, click to refresh the page.
Yesterday β€” 24 January 2026Main stream
Before yesterdayMain stream

From Incident to Insight: How Forensic Recovery Drives Adaptive Cyber Resilience

23 January 2026 at 10:07
=

When ransomware cripples a business’s systems or stealthy malware slips past defenses, the first instinct is to get everything back online as quickly as possible. That urgency is understandable β€” Cybersecurity Ventures estimates ransomware damage costs $156 million per day. But businesses cannot let speed overshadow the more pressing need to understand exactly what happened,..

The post From Incident to Insight: How Forensic Recovery Drives Adaptive Cyber Resilience appeared first on Security Boulevard.

Under Armour Ransomware Attack Exposes 72M Email Addresses

22 January 2026 at 10:04

Many records also contained additional personal information such as names, dates of birth, genders, geographic locations, and purchase information.

The post Under Armour Ransomware Attack Exposes 72M Email Addresses appeared first on TechRepublic.

New Osiris Ransomware Leverages Living Off the Land and Dual-Use Tools in Attacks

22 January 2026 at 08:28

A newly discovered ransomware family, Osiris, targeted a major foodservice franchisee in Southeast Asia in November 2025. Despite sharing a name with a 2016 Locky ransomware variant, security researchers confirm this represents an entirely new threat with no connection to its predecessor. However, evidence suggests potential links to threat actors previously associated with Inc ransomware […]

The post New Osiris Ransomware Leverages Living Off the Land and Dual-Use Tools in Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Under Armour Ransomware Attack Exposes 72M Email Addresses

22 January 2026 at 10:04

Many records also contained additional personal information such as names, dates of birth, genders, geographic locations, and purchase information.

The post Under Armour Ransomware Attack Exposes 72M Email Addresses appeared first on TechRepublic.

Researchers Expose LockBit 5.0 Affiliate Panel and New Encryption Variants

21 January 2026 at 08:28

LockBit 5.0 affiliate panel provide unprecedented visibility into the infrastructure of one of the world’s most notorious ransomware-as-a-service (RaaS) operations. Following the high-profile Operation Cronos disruption, security researchers have confirmed that LockBit has largely maintained its core operational procedures. However, cosmetic updates including holiday-themed interface elements suggest active development and continued operations. The leaked materials […]

The post Researchers Expose LockBit 5.0 Affiliate Panel and New Encryption Variants appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Hackers Weaponize 2,500+ Security Tools to Disable Endpoint Defenses Before Ransomware Attacks

21 January 2026 at 07:28

A sophisticated campaign has weaponized over 2,500 variants of a legitimate security driver to disable endpoint protection before deploying ransomware and remote access trojans. Attackers are abusing truesight.sys, a kernel-mode driver from Adlice Software’s RogueKiller antivirus suite. The legacy version 2.0.2 contains a critical vulnerability allowing arbitrary process termination via IOCTL command 0x22E044. This enables […]

The post Hackers Weaponize 2,500+ Security Tools to Disable Endpoint Defenses Before Ransomware Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Unmasked by Leaks: The Hidden Backbone of a Ransomware Operation

19 January 2026 at 07:28

The leaks tied to the BlackBasta ransomware group and Russian hosting company Media Land pulled back the curtain on something defenders rarely get to see: the internal machinery and people behind a major ransomware operation. In February 2025, an unknown individual using the handleΒ ExploitWhispersΒ appeared on Telegram and published a massive archive of BlackBasta’s internal chats […]

The post Unmasked by Leaks: The Hidden Backbone of a Ransomware Operation appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

DragonForce Ransomware Breakdown and Decryptor for ESXi & Windows

14 January 2026 at 08:01

Security researchers have published an in‑depth technical analysis of the DragonForce ransomware operation, along with details of working decryptors for both Windows and ESXi systems targeting specific victims. By the time its dedicated Data Leak Site (DLS) was identified later that month, 17 victim organizations had already been listed. DragonForce markets itself as a cartel […]

The post DragonForce Ransomware Breakdown and Decryptor for ESXi & Windows appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

LLMs Supercharge Ransomware Speed, Scale, and Global Reach

14 January 2026 at 04:21

Large language models are not fundamentally transforming ransomware operations. However, they are dramatically accelerating the threat landscape through measurable gains in speed, volume, and multilingual capabilities. According to SentinelLABS research, adversaries are leveraging LLMs across reconnaissance, phishing, tooling assistance, data triage, and ransom negotiations creating a faster, noisier threat environment that demands immediate defender adaptation. […]

The post LLMs Supercharge Ransomware Speed, Scale, and Global Reach appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Hackers Accessed University of Hawaii Cancer Center Patient Data; They Weren’t Immediately Notified

11 January 2026 at 21:09

UH officials refused to provide key information, including which cancer research project had been affected or how much UH paid the hackers to regain access to files.

The post Hackers Accessed University of Hawaii Cancer Center Patient Data; They Weren’t Immediately Notified appeared first on SecurityWeek.

Fog Ransomware Targets U.S. Organizations via Compromised VPN Credentials

9 January 2026 at 07:35

Arctic Wolf Labs has uncovered a new ransomware variant dubbed β€œFog” striking US organizations, primarily in education and recreation, through hijacked VPN access. First spotted on May 2, 2024, the attacks highlight vulnerabilities in remote access tools and the rapid encryption tactics used to exploit them.​ Arctic Wolf’s Incident Response team investigated multiple cases starting […]

The post Fog Ransomware Targets U.S. Organizations via Compromised VPN Credentials appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

❌
❌