Tens of thousands of web servers running cPanel, one of the most widely used hosting control panels in the world, have been ...
Threat hunters are warning that the cybercriminal operation known as VECT 2.0 acts more like a wiper than a ransomware due to ...
Researchers are warning that the VECT 2.0 ransomware has a problem in the way it handles encryption nonces that leads to ...
The emerging ransomware has been deployed in the TeamPCP supply chain attacks, but victims should think twice before paying ...
MuddyWater used Teams phishing in 2026 to steal credentials, enabling stealthy data exfiltration and persistence without ...
External cyber risk management tools company Searchlight Cyber Ltd. today announced the release of Ransomware File Explorer, a new capability within its Cerberus investigation platform that provides ...
OneDrive isn’t just a cloud folder—it’s a secure, flexible platform for storing, sharing, and protecting your files across devices. With features like password-protected links, Personal Vault ...
VECT 2.0 was built to lock your files and demand a ransom. A rookie coding mistake means it's just destroying them instead.
New capability indexes ransomware leak-site file trees into Cerberus platform, accelerating incident response even when organizations aren’t the primary victim. This feature allows analysts to quickly ...