
Browse all articles
August 16, 2022
Hydrox: A new wiper attacks
Hydrox was first spotted by Twitter user Petrovich on July 29, 2022. On August 3, EnigmaSoft described this threat as a harmful malware that actually wipes users' data. This conclusion was made from a “ransom note” which didn’t actually contain any credentials or links for paying the ransom.
August 15, 2022
Cisco breached in Yanluowang ransomware attack, 2.8 GB data stolen
Multi-national tech conglomerate Cisco has confirmed that the Yanluowang ransomware gang breached its corporate network in late May, and that the group tried to extort them by threatening to leak stolen files online. The Yanluowang gang claims to have stolen 2.8 GB of data, consisting of approximately 3,100 files which Cisco has described as "not sensitive."
August 15, 2022
U.K.'s National Health Service suffers outage after cyberattack
The United Kingdom's National Health Service (NHS) 111 emergency services are affected by a significant and ongoing outage. It was triggered by a cyberattack that hit the systems of Advanced, a British managed services provider (MSP).
August 08, 2022
Electronics manufacturer Semikron hit by LV ransomware
German electronics manufacturer Semikron has reported that they were hit by a ransomware attack. The LV ransomware group has claimed responsibility for this attack, and is threatening to leak 2 TB worth of stolen data if their ransom demands are not met.
August 05, 2022
European pipeline operator hit by BlackCat/ALPHV ransomware
The ALPHV/BlackCat ransomware gang claims to have stolen more than 150 GB of data from Creos Luxembourg S.A., a company which manages natural gas pipelines and electrical networks in the Grand Duchy of Luxembourg. The alleged stolen data consists of 180,000 files, including contracts, agreements, passports, bills and emails.
August 05, 2022
New attack framework Manjusaka is similar to Cobalt Strike
Researchers have observed a new post-exploitation attack framework in the wild. Manjusaka, as it's called, can be deployed as an alternative to the popular Cobalt Strike toolset — or parallel to it for redundancy.
July 30, 2022
Report: Attackers scan for vulnerabilities within 15 minutes of CVE disclosure
A new report from Palo Alto's Unit 42 found it only takes 15 minutes after the publication of a new CVE for the first cybercriminals to begin scanning potentially vulnerable targets. Within a few hours, the first active exploitation attempts have already started.












