Krispy Kreme, the dispenser of delectable doughnuts, says that it suffered a cyber attack at the end of last month which saw its IT systems compromised and has disrupted online orders in parts of the United States.Read more in my article on the Hot for Security blog.
Operation PowerOFF has disrupted what was anticipated to be a surge of distributed denial-of-service (DDoS) attacks over the Christmas period by taking over two dozen "booter" or "stresser" websites offline.Read more in my article on the Tripwire State of Security blog.
The 3AM ransomware first emerged in late 2023. Like other ransomware, 3AM exfiltrates victims' data (demanding a ransom is paid) and encrypts the copies left behind. Here's what you need to know.Read more in my article on the Tripwire State of Security blog.
The UK's National Crime Agency (NCA) has revealed details of Operation Destabilise, a years-long international law enforcement investigation into a giant Russian money laundering enterprise that handled billions of dollars for drug traffickers and ransomware gangs worldwide.Read more in my article on the Tripwire State of Security blog.
Stoli Group USA, the US subsidiary of vodka maker Stoli, has filed for bankruptcy – and a ransomware attack is at least partly to blame.The American branch of Stoli, which imports and distributes Stoli brands in the United States, as well as the Kentucky Owl bourbon brand it purchased in 2017, was hit by a ransomware attack in August 2024.Learn more in my article on the Exponential-e blog.
It's not a new technique, but that doesn't mean that cybercriminals cannot make rich rewards from SEO poisoning.Read more in my article on the Tripwire State of Security blog.
It's not a new technique, but that doesn't mean that cybercriminals cannot make rich rewards from SEO poisoning.Read more in my article on the Tripwire State of Security blog.
What is the point of INC Ransom's attack on Alder Hey? They are not likely to be paid, and the attack on a children's hospital only increases the chances that they will one day find their collars felt by law enforcement.Read more in my article on the Hot for Security blog.
A British hospital is grappling with a major cyberattack that has crippled its IT systems and disrupted patient care.Read more in my article on the Hot for Security blog.
What makes Mimic particularly unusual is that it exploits the API of a legitimate Windows file search tool ("Everything" by Voidtools) to quickly locate files for encryption.Find out more about the threat in my article on the Tripwire State of Security blog.