Ransomware Roundup – VanHelsing

Fortinet Blog 2025-05-16 15:00

The VanHelsing ransomware, first detected in March 2025, presents significant security challenges by utilizing TOR sites for ransom negotiations and data leaks. This sophisticated ransomware variant underscores the evolving tactics cybercriminals employ to evade detection and enhance anonymity. Organizations must bolster their cybersecurity measures to counteract such threats, emphasizing robust data protection and incident response strategies. The rise of VanHelsing highlights the critical need for continuous monitoring and threat intelligence to mitigate potential breaches. As ransomware tactics become increasingly complex, proactive defense mechanisms are essential to safeguard sensitive information.

Recent Articles

The Good, the Bad and the Ugly in Cybersecurity – Week 20

SentinelOne Blog 2025-05-16 13:00

In a significant victory for global cybersecurity, authorities have dismantled a botnet active since 2004 and arrested key figures linked to major cyb...

New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors

The Hacker News 2025-05-16 11:37

Cybersecurity experts have identified a new botnet malware, HTTPBot, targeting the gaming industry, technology firms, and educational institutions, pa...

Top 10 Best Practices for Effective Data Protection

The Hacker News 2025-05-16 10:30

Data protection is paramount in today's digital landscape, where cyber threats are constantly evolving and data privacy regulations are becoming more ...

Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks

The Hacker News 2025-05-16 09:08

Researchers from ETH Zürich have identified a new security vulnerability in modern Intel CPUs, dubbed Branch Privilege Injection (BPI). This flaw allo...

Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks

The Hacker News 2025-05-16 07:56

Cybersecurity researchers have uncovered a new malware campaign utilizing a PowerShell-based shellcode loader to deploy the Remcos RAT, a notorious re...

[Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications

The Hacker News 2025-05-16 07:27

In the fast-paced world of modern applications, security teams often struggle to keep up with the rapid development and deployment cycles, especially ...

Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit

The Hacker News 2025-05-15 16:45

Meta is facing potential legal challenges from Austrian privacy group noyb over its decision to use E.U. user data to train AI models without explicit...

​​How the Microsoft Secure Future Initiative brings Zero Trust to life

Microsoft Security Blog 2025-05-15 16:00

The Microsoft Secure Future Initiative (SFI) demonstrates how Zero Trust strategies can be effectively implemented to enhance organizational security....

Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails

The Hacker News 2025-05-15 14:28

Coinbase has revealed a security breach involving the bribery of its overseas customer support agents, leading to the theft of account data for less t...

Configure Your News Feed

Customize your cybersecurity news sources and email delivery preferences.

Go to Configuration