Skip to content

Articles tagged: ransomware

47 articles found

a few men looking at a computer screen
ransomwarehealthcarecritical-infrastructure

Ransomware Hits Healthcare

A recent ransomware attack on Dutch healthcare software vendor ChipSoft highlights the vulnerability of healthcare organizations to such attacks, which can have significant consequences for patient care. This article explores the key facts and implications of this threat. Ransomware attacks are a growing concern for healthcare.

3 min read
black digital device at 19 00
zero-dayransomwarecritical-infrastructure

Critical Flaws in Fortinet and Next.js Under Active Exploitation

Active exploitation of critical flaws in Fortinet and React2Shell, ransomware attacks on critical infrastructure, and significant crypto thefts highlight the urgent need for robust security measures. Read on to understand these threats and how to protect against them.

5 min read
a statue of a person with glasses
zero-dayransomwaremedusa-ransomware

Zero-Day Attacks Surge with Medusa Ransomware

A surge in zero-day exploitation is facilitating high-velocity Medusa ransomware attacks, while the Storm-1175 threat actor targets vulnerable systems. Thousands of zero-day flaws have been discovered across major systems, and a maximum-severity vulnerability in Flowise is being exploited for remote code execution.

critical
6 min read
black and white digital device
ai-assisted-attackssupply-chain-attacksransomware

AI-Driven Supply Chain Threats Escalate

Threat actors leverage AI for automated supply chain attacks, targeting GitHub misconfigurations and Node.js maintainers. Medusa ransomware campaigns exploit vulnerabilities at an alarming rate, highlighting the need for secure configuration practices.

5 min read
red and black laptop computer
ddos-attackscritical-infrastructureransomware

DDoS Attacks Disrupt Critical Infrastructure

A large-scale DDoS attack on Russian telecom giant Rostelecom has disrupted internet services across dozens of cities, highlighting the importance of robust security measures. Meanwhile, REvil leaders have been identified behind 130 German ransomware attacks, and emerging threats like LiteLLM are turning developer machines into credential vaults for attackers.

5 min read
black and white round frame
ransomwarecybercrimelaw-enforcement

Ransomware Leaders Identified

German police have identified the alleged leaders of the GandCrab and REvil ransomware groups, marking a significant victory in the fight against cybercrime. This breakthrough may lead to further disruptions of ransomware operations and reduce the incidence of such attacks.

critical
5 min read
a statue of a person with glasses
zero-dayransomwaremedusa-ransomware

Storm-1175 Threat Actor Exploits Zero-Days

China-linked Storm-1175 threat actor exploits zero-day and N-day vulnerabilities to deploy Medusa ransomware, posing a significant threat to internet-facing systems. Organizations must ensure their systems are up-to-date and securely configured to mitigate potential attacks.

4 min read
A combination lock rests on a computer keyboard.
zero-dayransomwarewindows

Medusa Ransomware Zero-Day Attacks

Medusa ransomware affiliate linked to zero-day attacks, posing a significant risk to organizations. Microsoft has identified Storm-1175 as the actor behind Medusa payloads, highlighting the need for timely vulnerability remediation and robust security measures.

4 min read
a laptop computer sitting on top of a wooden table
ransomwarezero-daywindows

Qilin and Warlock Ransomware Threats Escalate

Qilin and Warlock ransomware operations are using vulnerable drivers to disable over 300 EDR tools, posing a significant threat to cybersecurity. Learn about the emerging threats and techniques used by these ransomware groups.

5 min read
man in black jacket using computer
ransomwarecyberattackscritical-infrastructure

Ransomware Attacks Escalate with Qilin and REF1695 Operations

Active ransomware and cyberattacks are on the rise, with Qilin and REF1695 operations targeting organizations worldwide. Critical infrastructure is at risk, including emergency communications systems. Learn about the key threats and how to protect yourself.

5 min read
person using laptop computers
critical-infrastructurevulnerabilitiesremote-code-execution

Critical Infrastructure Under Siege

Vulnerabilities in critical infrastructure pose significant risks, with ShareFile flaws and Hitachi Energy's Ellipse product under attack. Emerging threats like CrystalRAT malware and Casbaneiro bank trojan also threaten security. Learn about the key threats and how to protect yourself.

critical
4 min read
Security, privacy, and performance status with fix options.
ransomwareai-securitycloud-security

Ransomware & AI Threats Escalate

Hospitals face severe consequences from ransomware attacks, while Google's Vertex AI poses a security risk due to over-privileged agents. Attackers are increasingly using trusted tools against organizations, highlighting the need for vigilance and rehearsals in defense.

5 min read
black flat screen tv showing game
ransomwaredata-wiping-attackscritical-infrastructure

Ransomware Strikes Medtech Giant

Medtech giant Stryker suffered a data-wiping attack claimed by Iranian-linked Handala hacktivist group, highlighting risks to critical infrastructure. The company has since returned to full operation, but the incident underscores the severity of ransomware threats.

5 min read
red padlock on black computer keyboard
ransomwarecrypto-exchange-hackscybersecurity

Ransomware and Crypto Exchange Hacks Surge

A surge in ransomware claims and crypto exchange hacks poses a significant threat to cybersecurity. Over 7,655 ransomware claims were reported in the past year, while a hacker stole $53 million from the Uranium crypto exchange. Learn how to protect yourself from these threats.

5 min read
A computer screen displays lines of code.
ransomwarewindowscritical-infrastructure

Bearlyfy's Custom Ransomware Hits Russian Firms

The Bearlyfy group has launched targeted ransomware attacks on over 70 Russian companies using custom GenieLocker ransomware, demonstrating increased sophistication in ransomware campaigns. These attacks aim to inflict maximum damage on Russian businesses, highlighting the need for enhanced cybersecurity measures.

4 min read
red padlock on black computer keyboard
ransomwareai-driven-securitycritical-infrastructure

Ransomware Disrupts Spanish Port as Experts Urge AI-Driven Security

A ransomware attack has disrupted operations at a major Spanish fishing port, highlighting the need for AI-native security tools to combat AI-based attacks. Experts emphasize that defenders must use AI-driven security to counter these threats. Learn about the recent attack and the importance of AI-driven security in this article.

6 min read
A wooden block spelling the word encryption on a table
malwareransomwarecryptocurrency

Malware Campaigns Target Crypto & Browser Data

Active malware and ransomware campaigns are targeting cryptocurrency and browser data, with threats like GlassWorm using Solana dead drops. Learn about the latest attacks and how to protect yourself.

3 min read
grey metal chain on white background
supply-chain-attacksregulatory-actionslaw-enforcement

Regulatory Crackdown on Cybercrime Amidst Rising Supply Chain Threats

Recent regulatory actions and law enforcement efforts target cybercrime, while supply chain attacks pose significant threats to code security. Learn about the latest developments and takeaways.

3 min read
brown padlock on black computer keyboard
ransomwarebotnetcybercrime

Russian Cybercriminal Sentenced to Prison for Ransomware Attacks

A Russian national has been sentenced to two years in prison for managing a botnet used in ransomware attacks against US companies. This sentencing highlights ongoing efforts to combat cybercrime and ransomware attacks. Learn more about the threat and how to protect yourself.

4 min read
wiper-malwarecritical-infrastructureiran-linked

Iran-Linked Wiper Malware Hits Medtech Firm Stryker

A critical Iran-linked wiper malware attack on medtech firm Stryker has raised concerns about nation-state actors targeting critical infrastructure. Meanwhile, new malware campaigns, including Slopoly and VENON, are evolving the threat landscape. Learn about these emerging threats and how to protect your organization.

3 min read
a laptop computer sitting on top of a desk
zero-dayransomwarelinux

Critical n8n and KadNap Exploits, Ransomware Surge

Active exploitation of n8n and KadNap malware poses critical threats, while ransomware attacks target healthcare organizations and critical infrastructure. Stay informed on the latest cybersecurity threats and take action to protect your systems.

critical
4 min read
a desk with several monitors
critical-infrastructureransomwarezero-day

Critical Infrastructure Under Siege

Critical infrastructure faces significant threats from vulnerabilities, ransomware, and nation-state attacks. Recent discoveries include Honeywell IQ4x BMS Controller and Apeman Cameras vulnerabilities, as well as new malware and threat actor activity. Learn how to protect your systems.

critical
5 min read
graphical user interface
ransomwarecyber-campaignswindows

ClickFix Ransomware and Russian Cyber Campaigns

ClickFix attack and Termite ransomware pose high severity threats, while Russian cyber campaigns target Signal and WhatsApp. Emerging threats include abuse of internet infrastructure and custom malware. Stay informed to protect against these evolving cyber threats.

4 min read
a computer monitor with a lot of code on it
targeted-attackscritical-infrastructureransomware

Critical Infrastructure Under Siege

Targeted attacks on critical infrastructure are on the rise, with a China-linked APT group targeting telecommunication service providers and a Russian ransomware operator pleading guilty in the US. These attacks highlight the need for robust security measures and international cooperation.

5 min read
a computer screen with green lights
ransomwarecybercrimecritical-infrastructure

Ransomware Takedowns and Critical Infrastructure Threats Escalate

Law enforcement actions against ransomware operations and stolen credential marketplaces show progress, but targeted attacks on critical infrastructure and emerging threats pose significant risks. Organizations must stay vigilant and adapt their security strategies to combat these evolving threats.

4 min read
a blue and white logo
zero-dayransomwarecloud-security

Critical Threats: AWS Drone Strikes, Ransomware, and Zero-Days

AWS data centers face drone strikes, major ransomware attacks hit healthcare and gaming, and zero-day vulnerabilities are exploited in the wild. Stay ahead of these critical threats with our latest analysis.

high
3 min read
a laptop and a computer
ransomwareai-securityhealthcare

Ransomware Hits Sensitive Targets Amid AI Security Concerns

A recent ransomware attack on the University of Hawai'i Cancer Center highlights the importance of protecting sensitive data. Meanwhile, the increasing use of AI in development poses new security challenges. Learn about these threats and how to mitigate them.

5 min read
black laptop computer turned on with green screen
ransomwarehealthcarecritical-infrastructure

Ransomware Hits Healthcare

A critical ransomware attack has hit a Mississippi healthcare system, while over 900 Sangoma FreePBX instances have been compromised in ongoing web shell attacks. These incidents highlight the vulnerability of healthcare systems to cyber threats.

3 min read
cybersecurity-researchransomwarepost-quantum-cryptography

Cybersecurity Research and Awareness

Expert recommends preparing for post-quantum cryptography now, while Samsung updates ACR privacy practices after Texas lawsuit. The rise of ransomware has generated funding for a complex criminal ecosystem.

4 min read
laptop compute displaying command prompt
zero-dayransomwareazure

Chrome Zero-Day & Azure Ransomware Attacks

A critical Google Chrome zero-day vulnerability is being exploited, while a Microsoft Azure vulnerability is being used by ransomware attackers. Learn about these threats and how to protect yourself.

4 min read
text
zero-dayrouter-vulnerabilitiesstate-sponsored-hacks

Critical Router Flaws and State-Sponsored Hacks Expose Networks

Zero-day vulnerabilities in Juniper Networks PTX and Zyxel routers allow for full router takeover, while Chinese cyberspies breach telecom firms and government agencies. Ransomware and cybercrime threats also persist.

5 min read
woman in black long sleeve shirt using laptop computer
ransomwarezero-dayhealthcare

Other Notable Threats Emerge as Ransomware and Zero-Days Persist

A previously undocumented threat activity cluster targets US education and healthcare, while Zyxel patches a critical vulnerability in its routers. Meanwhile, ransomware attacks and zero-day exploits continue to pose significant threats.

4 min read
person using black laptop computer
ransomwarecyberattackai-generated-threats

Ransomware Payments Plummet Amidst Surge in Attacks

Despite a surge in ransomware attacks, payments to threat actors have dropped significantly. This trend, combined with the emergence of AI-powered fake ID sites and cyberattacks on medical device makers, underscores the evolving landscape of cybersecurity threats.

4 min read
a man sitting in front of a computer monitor
cyber-espionagemalicious-packagesransomware

Chinese Cyberspies Breach Telecom Firms as Malicious Packages Target Developers

Chinese cyberspies have breached dozens of telecom firms and governments worldwide, while malicious packages target developers and the financial sector. Ransomware and data breaches affect multiple industries, and security patches address critical vulnerabilities.

4 min read
text
zero-dayransomwarecritical-infrastructure

Critical Cisco SD-WAN Vulnerabilities Exploited

Multiple critical vulnerabilities in Cisco SD-WAN products are being exploited, allowing attackers to gain admin access and potentially disrupt critical infrastructure. Ransomware attacks are also on the rise, with a recent surge in attack numbers despite decreased payments.

4 min read
Workers at computers in a modern office setting
zero-daysd-wansupply-chain

Cisco SD-WAN Zero-Day Exploited, Devs Targeted, and Major Breaches

A critical Cisco SD-WAN zero-day is under active exploitation, while developers face targeted attacks, and major data breaches hit millions of users. Learn about the threats and how to protect yourself.

5 min read
photo of computer cables
zero-daycisco-sd-wanai-threats

Cisco SD-WAN Zero-Day Exploited, AI Threats Rise

Critical Cisco SD-WAN vulnerabilities are under active exploitation, while malicious AI-related activities and targeted attacks on critical infrastructure pose significant threats to global security. Learn about the key risks and how to protect your organization.

4 min read
a computer monitor and keyboard on a desk
ransomwarecyber-espionagecritical-infrastructure

Ransomware and Cyber Espionage Threats Escalate

Ransomware and cyber espionage campaigns are on the rise, targeting critical infrastructure and sensitive information. Recent attacks include a Chinese cyber espionage campaign that breached 53 organizations across 42 countries, and the Lazarus Group's use of Medusa ransomware in attacks on the Middle East and US healthcare sectors.

4 min read
A figure is using a laptop in the dark.
ransomwaredata-breachesphishing

Ransomware Attacks Surge

A surge in ransomware attacks targets healthcare organizations, while a medical device maker discloses a data breach and phishing campaigns hit freight companies. Learn about the key threats and how to protect yourself.

5 min read
a laptop with a green screen
ransomwarecybersecuritythreat-intelligence

Ransomware Payments Plummet Amidst Rising Attacks

Despite a surge in ransomware attacks, payments to threat actors have reached an all-time low. Recent incidents include the breach of Olympique Marseille and a lawsuit against SonicWall. Learn about the evolving landscape of ransomware threats and how to defend against them.

3 min read
photo of computer cables
zero-dayransomwarecisco-sd-wan

Cisco SD-WAN Zero-Day Exploited, Plus Ransomware and SolarWinds Patches

A critical zero-day vulnerability in Cisco SD-WAN is being actively exploited, while the Lazarus Group launches a Medusa ransomware campaign and SolarWinds patches critical Serv-U flaws. Learn about these threats and how to protect your organization.

3 min read
ransomwaremedusa-ransomwarelazarus-group

Lazarus Group Attacks Healthcare with Medusa Ransomware

The Lazarus Group has launched targeted attacks on healthcare and Middle East entities using Medusa ransomware, while vulnerabilities in InSAT MasterSCADA and Schneider Electric products pose additional risks to critical infrastructure. Learn about the threats and how to protect your organization.

4 min read
A laptop computer sitting on top of a desk
nation-state-attacksransomwarezero-day

Nation-State Cyberattacks Surge

MuddyWater, APT28, and Lazarus Group launch targeted attacks on organizations worldwide. Learn about the latest nation-state sponsored cyber threats and how to protect your organization.

4 min read
black laptop computer with white paper
zero-dayransomwaredata-breaches

Zero-Day Vulnerability Under Active Exploitation

A critical zero-day vulnerability is being actively exploited, while significant data breaches and new malware campaigns pose high risks to users. Immediate action is necessary to prevent further exploitation.

4 min read
a desk with several monitors
zero-dayransomwarecritical-infrastructure

Zero-Days & Ransomware: Twin Threats to US Security

The Lazarus Group's Medusa ransomware attacks and active exploitation of zero-day vulnerabilities pose significant threats to national security. Recent incidents involve a former US defense contractor employee selling zero-day exploits to a Russian broker and the targeting of US healthcare organizations with Medusa ransomware.

5 min read
red padlock on black computer keyboard
zero-dayransomwaresupply-chain-attacks

Critical Vulnerabilities Under Attack

Multiple critical vulnerabilities are being actively exploited by threat actors, including the ShinyHunters extortion gang and North Korean state-backed hackers. New malware families and supply chain attacks are also on the rise, targeting healthcare organizations and financial institutions.

4 min read
brown padlock on black computer keyboard
zero-dayransomwaresupply-chain

SolarWinds & FortiGate Under Attack

Critical vulnerabilities in SolarWinds and FortiGate pose significant risks, while recent ransomware attacks and newly disclosed threats demand immediate attention from security teams. Learn about the key threats and how to protect your organization.

4 min read
ProjectZyper AI ProjectZyper AI

AI-powered cybersecurity threat intelligence. Aggregated, analyzed, and published daily.

Powered by AI

Status

Live threat monitor Monitoring threat feeds — updated hourly

AI-generated content. Verify critical information independently.

© 2026 ProjectZyper AI. All rights reserved.