Only a quarter (24%) of ransomware incident involved the encryption of data. Data was stolen and either leaked or retained in 54% of cases analyzed. These multidimensional tactics appear largely ...
While ‘traditional’ ransomware attacks remain stable, some gangs are shifting towards exploiting zero-days and supply chains to go straight to stealing data ...
Ransomware attacks continued to climb in 2025 as attackers increasingly timed operations around year-end staffing gaps and shifted away from traditional file encryption.
A new Linux variant of the “Gunra” ransomware family has been identified with highly configurable multithreading, allowing attackers to run up to 100 parallel encryptions. A Trend Micro research ...
Zscaler documented that the data encryption platform’s ransomware attacks surged by more than 146% throughout 2025 because of cybercriminals using sophisticated tactics and discovering multiple ...
New research from Trellix detailed that CrazyHunter ransomware has emerged as a serious and escalating threat, underscoring the growing sophistication of modern cybercriminal operations.
Cyber extortion, by contrast, now encompasses a much broader set of coercive tactics, including data theft and leak threats, ...
Emulex Secure Host Bus Adapters Answer the Call by Governments Worldwide to Encrypt All Data with a Quantum-Resistant, Zero Trust Solution PALO ALTO, Calif., Jan. 28, 2025 (GLOBE NEWSWIRE) -- Broadcom ...
The pro-Russia hacktivist group CyberVolk launched a ransomware-as-a-service (RaaS) called VolkLocker that suffered from serious implementation flaws, allowing victims to potentially decrypt files for ...
Kidney dialysis firm DaVita disclosed Monday it suffered a weekend ransomware attack that encrypted parts of its network and impacted some of its operations. DaVita is a major provider of kidney care ...
SAN JOSE, Calif.--(BUSINESS WIRE)--Cy4Data Labs, the first cybersecurity company to provide in-use data protection and the industry’s only quantum-proof encryption, today announced that Datos Insights ...
After integrating a network-attached storage (NAS) into your work or personal life, the next big step is to secure your data.