Tag ransomware

The Argument for Banning Ransom Payments and Potential Timelines for Implementation

Cybersecurity Implications Following Recent UK Ransomware Incidents Note: This summary has been edited for clarity and conciseness. In a recent dialogue, Mathew Schwartz from Information Security Media Group conversed with Jen Ellis, founder of NextJenSecurity. Their discussion centered on the escalating ransomware threats facing businesses in the U.K., notably referencing…

Read MoreThe Argument for Banning Ransom Payments and Potential Timelines for Implementation

Fintech Company Marquis Blames SonicWall Security Breach for Hack

In a serious cybersecurity incident, fintech company Marquis has linked a substantial data breach to weaknesses in its security partner, SonicWall. This breach, which occurred in August 2025, reportedly involved unauthorized access to sensitive customer information, including personal details, banking records, and Social Security numbers of numerous clients in the…

Read MoreFintech Company Marquis Blames SonicWall Security Breach for Hack

Cyber Group Claims to Have Identified Hacker Responsible for Manage My Health Breach

The recent cyberattack on Manage My Health, a widely used patient records platform in New Zealand, represents one of the most significant privacy breaches in recent history for the country. Unauthorized actors gained access to sensitive medical information, including personal health data, showcasing serious vulnerabilities in fundamental healthcare systems. Shortly…

Read MoreCyber Group Claims to Have Identified Hacker Responsible for Manage My Health Breach

Hackers Discover New Method to Bypass Microsoft Office 365 Safe Links

Recent findings from security researchers indicate that some hacking groups have discovered a method to circumvent a critical security feature within Microsoft Office 365, aimed at safeguarding users from phishing and malware threats. Known as Safe Links, this feature is bundled with Microsoft’s Advanced Threat Protection (ATP) and operates by…

Read MoreHackers Discover New Method to Bypass Microsoft Office 365 Safe Links

Cascade of Attacks: From IT and OT to Patient Care

Cybercrime, Fraud Management & Cybercrime, Fraud Risk Management Trellix Reports Email and Identity Failures as Key Vectors in Healthcare Cybersecurity Incidents Marianne Kolbasuk McGee (HealthInfoSec) • January 27, 2026 According to a recent Trellix report, cyber incidents involving non-clinical IT systems and operational technology (OT) can negatively influence patient care…

Read MoreCascade of Attacks: From IT and OT to Patient Care

New Virus Determines Your Computer’s Suitability for Mining or Ransomware Attacks

Recent findings from security researchers have unveiled a novel malware strain capable of infecting systems with either a cryptocurrency miner or ransomware, depending on configuration settings that dictate the most profitable scheme. This dual-functionality indicates a strategic evolution in cybercriminal tactics, aiming to optimize revenue generation through diverse exploitation methods.…

Read MoreNew Virus Determines Your Computer’s Suitability for Mining or Ransomware Attacks

Uncover the Truth: Exploring the Depths of the Cybercriminal Underground Beyond the Headlines

Each month, Cybersixgill’s threat experts provide insights into the latest tactics, techniques, and procedures employed by cybercriminals. Their reports shed light on emerging threats from the underground, detailing the actors involved and offering guidance on risk mitigation strategies. Regular updates on vulnerabilities, ransomware, and malware trends from the deep and…

Read MoreUncover the Truth: Exploring the Depths of the Cybercriminal Underground Beyond the Headlines

DOGE Transfers Social Security Data to the Cloud

Cybercrime, Fraud Management & Cybercrime Recent Developments: CIRO Phishing Breach, Ingram Micro Ransomware, and CVE Increase Pooja Tikekar (@PoojaTikekar) • January 22, 2026 Image: Shutterstock/ISMG ISMG compiles weekly summaries of cybersecurity breaches globally. Recent incidents include sensitive data shared by the U.S. Social Security Administration on an unauthorized Cloudflare server,…

Read MoreDOGE Transfers Social Security Data to the Cloud