Home
About us
Articles
TRU Events
Acronis.com
TRU Security
Updates from Acronis Threat Research Unit
Home
About us
Articles
TRU Events
Acronis.com
TRU Security
All articles
All articles
Follow us on
Filter news by
Product
All
Acronis Cyber Backup
Acronis Snap Deploy
Acronis Files Connect
Acronis Disk Director Business
Acronis True Image 2021
Acronis Cyber Cloud
Acronis Cyber Infrastructure
Acronis Backup Advanced for vCloud
Acronis Monitoring Service
Acronis Cyber Cloud for Enterprise
Acronis VSS Doctor
Acronis Cyber Disaster Recovery
Acronis Disk Director
Acronis Cyber Notary Cloud
Acronis Revive
Acronis MassTransit
Acronis Cyber Files Cloud
Acronis Cyber Cloud Storage
Acronis Cyber Backup Cloud
Acronis Cyber Disaster Recovery Cloud
Acronis Cloud Manager
Acronis Cyber Files
Acronis Cloud Security
Acronis #CyberFit Score
Acronis Service Providers
Acronis Cloud Migration
Acronis AnyData Engine
Acronis Professional Services
Acronis Cyber Protect Cloud
Acronis Cyber Appliance
Acronis Cyber Protect
Acronis DeviceLock DLP
Acronis Ransomware Protection
Acronis Detection and Response
Acronis True Image
Acronis Cyber Protect Connect
Acronis Test Cyber Protect Renaming
Acronis True Image for Home
Acronis Cyber Protect for Enterprise
Acronis Cyber Protect Home & Business
Acronis Cyber Protect Home & Business
Acronis Cyber Protect for OT
No data
Year
All
2025
2024
2023
2022
2021
No data
Month
All
January
February
March
April
May
June
July
August
September
October
November
December
No data
Search by tag
Cybersecurity
Ransomware protection
Cyber protection
Malware protection
Cyberthreats
MSP cybersecurity
Antivirus protection
Data protection
Corporate cybersecurity
Cyber protection for businesses
Explore more tags
Search by keywords
Browse Cybersecurity Articles
July 30, 2022
Report: Attackers scan for vulnerabilities within 15 minutes of CVE disclosure
A new report from Palo Alto's Unit 42 found it only takes 15 minutes after the publication of a new CVE for the first cybercriminals to begin scanning potentially vulnerable targets. Within a few hours, the first active exploitation attempts have already started.
July 29, 2022
QBot malware uses Windows Calculator to side-load attacks
Security researchers have discovered that QBot malware is now using the legitimate Windows Calculator app for DLL side-loading attacks. The method continues to be used in current malspam campaigns.
July 29, 2022
LockBit ransomware hits numerous victims, including two townships
The Canadian town of St. Marys, Ontario, has been hit by a ransomware attack that locked staff out of internal systems and encrypted data. The small town of around 7,500 residents appears to be the second such target to be attacked by LockBit in just over a week.
July 27, 2022
Version 4.2 of malicious shortcut generator MLNK Builder emerges on dark web
A new version of MLNK Builder, a link generation tool popular among cybercriminals, has emerged on the dark web. The updated feature set focuses on antivirus evasion and masquerading techniques, using icons of popular legitimate applications and file formats.
July 25, 2022
Building materials firm Knauf hit by Black Basta ransomware
The Knauf Group, a German-based multinational producer of construction materials, has announced that it's been the target of a cyberattack. The incident took place on the night of June 29, forcing its global IT team to shut down email systems, although communications were still possible via mobile devices and Microsoft Teams.
July 25, 2022
European data centers running hot
An ongoing heatwave in Europe has sent temperatures above 40 degrees Celsius / 110 degrees Fahrenheit. Among other problems, this has stressed cooling systems at various data centers across the continent. Oracle and Google have both had to contend with heat-related failures in their UK cloud data centers.
July 19, 2022
U.S. healthcare organizations targeted with Maui ransomware
The FBI, CISA and U.S. Department of the Treasury have issued a joint advisory warning of alleged North-Korean-backed threat actors using Maui ransomware in attacks against healthcare and public health (HPH) organizations.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47