Tag Malware

New Incident Report Uncovers Hive Ransomware’s Targeting Tactics against Organizations

A Hive ransomware incident recently targeted an unspecified organization, leveraging vulnerabilities in Microsoft Exchange Server known as “ProxyShell” to conduct a swift attack that culminated in network encryption within 72 hours of initial compromise. This information was shared by Nadav Ovadia, a security researcher from Varonis, in a detailed post-mortem…

Read MoreNew Incident Report Uncovers Hive Ransomware’s Targeting Tactics against Organizations

Edelson Lechtzin LLP Investigating Potential Data Breach Claims for Customers of Motility Software Solutions, Inc.

NEWTOWN, Pa., Oct. 1, 2025 /PRNewswire/ — Edelson Lechtzin LLP, a prominent national class action law firm, has initiated an investigation into data privacy violations linked to a breach at Motility Software Solutions, Inc. (“Motility”). The company first detected the security incident around August 19, 2025. Interested parties are encouraged…

Read MoreEdelson Lechtzin LLP Investigating Potential Data Breach Claims for Customers of Motility Software Solutions, Inc.

Panchan: A Golang-based Peer-to-Peer Botnet Aiming at Linux Servers

Recently, cybersecurity researchers have identified a new Golang-based peer-to-peer (P2P) botnet, named Panchan, that has been actively targeting Linux servers within the education sector since its debut in March 2022. This malware exploits built-in concurrency features to enhance its propagation and deploy malicious modules, specifically by harvesting SSH keys to…

Read MorePanchan: A Golang-based Peer-to-Peer Botnet Aiming at Linux Servers

Hackers Concealed Malware Using Complex AI Code

Artificial Intelligence & Machine Learning, Next-Generation Technologies & Secure Development Attackers Conceal Malware Within Vector Image Rashmi Ramesh (rashmiramesh_) • September 24, 2025 Image: Shutterstock Recent findings indicate that hackers have utilized artificial intelligence-generated code to embed malware in a sophisticated phishing campaign, according to insights from Microsoft. This malware…

Read MoreHackers Concealed Malware Using Complex AI Code

Researchers Discover Kimusky Infra Targeting South Korean Politicians and Diplomats

The North Korean state-sponsored hacking group known as Kimusky has been implicated in a recent series of cyberattacks targeting political and diplomatic organizations within South Korea. This activity, which began in early 2022, has raised alarms in the cybersecurity community about the sophisticated tactics employed by the group. Kaspersky, a…

Read MoreResearchers Discover Kimusky Infra Targeting South Korean Politicians and Diplomats

Understanding How Interlock Ransomware Targets Healthcare Organizations

Ransomware incidents have surged dramatically within the healthcare sector, revealing critical vulnerabilities that threaten millions. Notably, UnitedHealth has reported that 190 million Americans suffered personal and healthcare data breaches due to a ransomware attack on Change Healthcare, nearly doubling earlier estimates. This incident underscores how ransomware can effectively compromise essential…

Read MoreUnderstanding How Interlock Ransomware Targets Healthcare Organizations

AsyncRAT Campaign Deploys Python Payloads and TryCloudflare Tunnels for Stealthy Attacks

Recent investigations have revealed a sophisticated malware campaign deploying a remote access trojan (RAT) called AsyncRAT, utilizing Python payloads and TryCloudflare tunnels for distribution. Forcepoint X-Labs researcher Jyotika Singh indicated that AsyncRAT capitalizes on the async/await programming model, allowing attackers to covertly access and manipulate infected systems, exfiltrate data, and…

Read MoreAsyncRAT Campaign Deploys Python Payloads and TryCloudflare Tunnels for Stealthy Attacks

Chinese Hackers Employ Stealthy Infection Chain to Deploy LODEINFO Malware

A recently reported cybersecurity incident has revealed a stealthy infection chain employed by the Chinese state-sponsored group known as Stone Panda. This threat actor has been targeting various entities in Japan, including media outlets, governmental and public sector organizations, as well as think tanks, raising alarms about the potential risk…

Read MoreChinese Hackers Employ Stealthy Infection Chain to Deploy LODEINFO Malware

Russian Courts Under Threat from CryWiper Data Wiper Malware Disguised as Ransomware

A new variant of data-wiping malware, identified as CryWiper, has emerged and is specifically targeting Russian government institutions, such as mayoral offices and courthouses. Unlike traditional ransomware that encrypts data, CryWiper masquerades as ransomware but ultimately destroys data without providing any means of recovery. Kaspersky researchers Fedor Sinitsyn and Janis…

Read MoreRussian Courts Under Threat from CryWiper Data Wiper Malware Disguised as Ransomware