• HomeAbout usArticlesTRU EventsAcronis.com

TRU Security

Updates from Acronis Threat Research Unit

HomeAbout usArticlesTRU EventsAcronis.com
TRU Security
All articles
All articles
Follow us on
  • facebook
  • twitter
  • yt
  • linkedin
  • spiceworks
  • reddit
  • rss
Filter news by
Product
  • All
  • Acronis Cyber Backup
  • Acronis Snap Deploy
  • Acronis Files Connect
  • Acronis Disk Director Business
  • Acronis True Image 2021
  • Acronis Cyber Cloud
  • Acronis Cyber Infrastructure
  • Acronis Backup Advanced for vCloud
  • Acronis Monitoring Service
  • Acronis Cyber Cloud for Enterprise
  • Acronis VSS Doctor
  • Acronis Cyber Disaster Recovery
  • Acronis Disk Director
  • Acronis Cyber Notary Cloud
  • Acronis Revive
  • Acronis MassTransit
  • Acronis Cyber Files Cloud
  • Acronis Cyber Cloud Storage
  • Acronis Cyber Backup Cloud
  • Acronis Cyber Disaster Recovery Cloud
  • Acronis Cloud Manager
  • Acronis Cyber Files
  • Acronis Cloud Security
  • Acronis #CyberFit Score
  • Acronis Service Providers
  • Acronis Cloud Migration
  • Acronis AnyData Engine
  • Acronis Professional Services
  • Acronis Cyber Protect Cloud
  • Acronis Cyber Appliance
  • Acronis Cyber Protect
  • Acronis DeviceLock DLP
  • Acronis Ransomware Protection
  • Acronis Detection and Response
  • Acronis True Image
  • Acronis Cyber Protect Connect
  • Acronis Compliance Navigator
  • Acronis True Image for Home
  • Acronis Cyber Protect for Enterprise
  • Acronis Cyber Protect Home & Business
  • Acronis Cyber Protect Home & Business
  • Acronis Cyber Protect for OT
  • No data
Year
  • All
  • 2025
  • 2024
  • 2023
  • 2022
  • 2021
  • No data
Month
  • All
  • January
  • February
  • March
  • April
  • May
  • June
  • July
  • August
  • September
  • October
  • November
  • December
  • No data
Search by tag
Cybersecurity
Ransomware protection
Malware protection
Cyberthreats
MSP cybersecurity
Threat detection
Phishing
Email security
Search by keywords
Browse Cybersecurity Articles
September 01, 2022
LockBit gang plans triple-extortion tactics
The LockBit ransomware gang has announced that it is working to take its operation to the triple-extortion level. The gang is now looking to add DDoS as an extortion tactic on top of encrypting data and exfiltrating it (to threaten future leaks).
September 01, 2022
Library services firm Baker & Taylor hit by ransomware
Baker & Taylor, the world's largest distributor of books to libraries worldwide, confirmed it's still working on restoring systems after being hit by ransomware more than a week ago. With an annual revenue of $4.6 billion, the Charlotte, North Carolina-based firm currently services more than 5,000 public and academic libraries.
September 01, 2022
Crypto-mining malware lurks on systems for weeks
A new threat campaign has seen cryptocurrency-mining malware distributed across at least 11 countries, disguised as translator apps and music download apps. The app itself provides the advertised functionality, but also hides a sneaky downloader.
August 29, 2022
Quantum ransomware attack hits Dominican Republic government agency
The Dominican Republic's Instituto Agrario Dominicano (IAD) has suffered a ransomware attack by the Quantum group. According to the ransom note, at least four physical servers and eight virtual servers with the databases, applications and emails were compromised.
August 29, 2022
Bombardier Recreational Products hit by RansomEXX gang
The RansomEXX ransomware gang is claiming responsibility for the cyberattack against Bombardier Recreational Products (BRP), which was disclosed by the company on August 8, 2022.
August 29, 2022
Greece's largest natural gas distributor hit by Ragnar Locker ransomware
Greece's largest distributor of natural gas, National Natural Gas System Operator S.A. (or DEFSA), has stated that they've suffered a limited-scope data breach and IT system outage following a cyberattack. Further details were confirmed after their data was leaked by the Ragnar Locker ransomware gang.
August 25, 2022
SideWinder uses weaponized Word documents to compromise victims’ machines
The SideWinder APT group was first discovered in 2018, and since earlier this year has been actively targeting military, defense and other industries in South Asia. They used to spread phishing emails with Word files that downloaded additional files to decode, drop and start the malware, which collects and uploads victims’ data to remote servers. They've since infected Android devices with malicious apps in Google Play.
1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768
Engage with TRU Security (RSS Feed Reader required)
  • cpoc
  • Legal information
  • Privacy policy
  • Acronis Cookie Notice
  • Notice of collection
© 2003–2025 Acronis International GmbH.
  • Deutsch
  • English
  • Español
  • Francais
  • Italiano
  • 日本語
  • Dutch
  • Português
  • Svenska
  • No data