The CISA KEV catalog was expanded with 245 vulnerabilities in 2025, including 24 flaws exploited by ransomware groups.
1don MSN
This critical severity flaw in D-Link DSL gateway devices could allow for remote code execution
Earlier this week, security researchers from VulnCheck announced finding a command injection vulnerability due to improper ...
A threat actor has leaked the complete source code for the first version of the HelloKitty ransomware on a Russian-speaking hacking forum, claiming to be developing a new, more powerful encryptor. The ...
Security researchers are warning that a new wave of LockBit ransomware variants is in the wild following a leak of the source code used by the prolific ransomware gang last year. First emerging in ...
The alleged source code for the third iteration of the Knight ransomware is being offered for sale to a single buyer on a hacker forum by a representative of the operation. Knight ransomware launched ...
Two recently identified ransomware gangs are using payloads that contain almost identical code, suggesting that the groups’ affiliates are using shared infrastructure. The groups, named HellCat and ...
One problem with running a ransomware operation along the lines of a regular business is that disgruntled employees may want to sabotage the operation over some perceived injustice. That appears to ...
A threat actor has sold for just $500 the source code and a cracked builder for Zeppelin, a Russian ransomware strain used in numerous attacks on US businesses and organizations in critical ...
Cybercriminals are maximizing the potential damage to your organization to boost their profits. A staggering 91% of reported ransomware attacks included a data exfiltration effort. Now is the time to ...
Ransomware has always been more than a technical risk—it’s a business, a weapon, and a psychological warfare tool. In my previous Forbes article titled “Ransomware on a Rampage; a New Wake-Up Call,” I ...
A newly formed ransomware gang is attempting to extort a sizable payment from MSI after claiming to have stolen a treasure trove of data, including sensitive source code. The gang, which goes by the ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results