Tag ransomware

Cyber Attacks, AI Misuse, and Data Privacy Regulations: Key Risks for India’s Corporate Boardrooms

Rising Cybersecurity Threats and AI Governance Issues Highlighted in FICCI–EY Risk Survey Recent findings from the FICCI–EY Risk Survey 2026, released on February 8, illustrate escalating risks that Indian businesses face, chiefly stemming from cybersecurity breaches, inadequate governance of artificial intelligence (AI), and increasing scrutiny under India’s data protection laws.…

Read MoreCyber Attacks, AI Misuse, and Data Privacy Regulations: Key Risks for India’s Corporate Boardrooms

The Argument for Banning Ransom Payments and Potential Timelines for Implementation

Cybersecurity Implications Following Recent UK Ransomware Incidents Note: This summary has been edited for clarity and conciseness. In a recent dialogue, Mathew Schwartz from Information Security Media Group conversed with Jen Ellis, founder of NextJenSecurity. Their discussion centered on the escalating ransomware threats facing businesses in the U.K., notably referencing…

Read MoreThe Argument for Banning Ransom Payments and Potential Timelines for Implementation

Fintech Company Marquis Blames SonicWall Security Breach for Hack

In a serious cybersecurity incident, fintech company Marquis has linked a substantial data breach to weaknesses in its security partner, SonicWall. This breach, which occurred in August 2025, reportedly involved unauthorized access to sensitive customer information, including personal details, banking records, and Social Security numbers of numerous clients in the…

Read MoreFintech Company Marquis Blames SonicWall Security Breach for Hack

Cyber Group Claims to Have Identified Hacker Responsible for Manage My Health Breach

The recent cyberattack on Manage My Health, a widely used patient records platform in New Zealand, represents one of the most significant privacy breaches in recent history for the country. Unauthorized actors gained access to sensitive medical information, including personal health data, showcasing serious vulnerabilities in fundamental healthcare systems. Shortly…

Read MoreCyber Group Claims to Have Identified Hacker Responsible for Manage My Health Breach

Hackers Discover New Method to Bypass Microsoft Office 365 Safe Links

Recent findings from security researchers indicate that some hacking groups have discovered a method to circumvent a critical security feature within Microsoft Office 365, aimed at safeguarding users from phishing and malware threats. Known as Safe Links, this feature is bundled with Microsoft’s Advanced Threat Protection (ATP) and operates by…

Read MoreHackers Discover New Method to Bypass Microsoft Office 365 Safe Links

Cascade of Attacks: From IT and OT to Patient Care

Cybercrime, Fraud Management & Cybercrime, Fraud Risk Management Trellix Reports Email and Identity Failures as Key Vectors in Healthcare Cybersecurity Incidents Marianne Kolbasuk McGee (HealthInfoSec) • January 27, 2026 According to a recent Trellix report, cyber incidents involving non-clinical IT systems and operational technology (OT) can negatively influence patient care…

Read MoreCascade of Attacks: From IT and OT to Patient Care

New Virus Determines Your Computer’s Suitability for Mining or Ransomware Attacks

Recent findings from security researchers have unveiled a novel malware strain capable of infecting systems with either a cryptocurrency miner or ransomware, depending on configuration settings that dictate the most profitable scheme. This dual-functionality indicates a strategic evolution in cybercriminal tactics, aiming to optimize revenue generation through diverse exploitation methods.…

Read MoreNew Virus Determines Your Computer’s Suitability for Mining or Ransomware Attacks

Uncover the Truth: Exploring the Depths of the Cybercriminal Underground Beyond the Headlines

Each month, Cybersixgill’s threat experts provide insights into the latest tactics, techniques, and procedures employed by cybercriminals. Their reports shed light on emerging threats from the underground, detailing the actors involved and offering guidance on risk mitigation strategies. Regular updates on vulnerabilities, ransomware, and malware trends from the deep and…

Read MoreUncover the Truth: Exploring the Depths of the Cybercriminal Underground Beyond the Headlines