extortion
![Ferrari](https://img.helpnetsecurity.com/wp-content/uploads/2023/03/21121803/ferrari-1600-400x200.jpg)
Ferrari data breach: Client data exposed
Italian luxury sports car maker Ferrari has suffered a data breach and has confirmed on Monday that it “was recently contacted by a threat actor with a ransom demand …
![Riot Games](https://img.helpnetsecurity.com/wp-content/uploads/2023/01/25124149/riot-games-1280-400x200.jpg)
Riot Games breached: How did it happen?
The hackers who breached Riot Games last week are asking for $10 million not to leak the stolen source code for the company’s popular League of Legends online game. The …
![Eyes](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112400/laptop-eyes-technology-computer-400x200.jpg)
Fake subscription invoices lead to corporate data theft and extortion
A threat actor dubbed Luna Moth has been leveraging social engineering and legitimate software to steal sensitive data and extort money from small and medium-size businesses. …
![Cisco](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101404/cisco-400x200.jpg)
Cisco has been hacked by a ransomware gang
U.S. networking giant Cisco Systems has been hacked, the company confirmed on Wednesday, after Yanluowang ransomware operators claimed the attack on their leak site. …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2022/06/17130642/ransomware-1600-400x200.jpg)
Conti effectively created an extortion-oriented IT company, says Group-IB
In slightly more than a month, the Conti ransomware collective compromised more than 40 companies worldwide, and the fastest attack took only three days, Group-IB’s noted in …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2022/06/17130642/ransomware-1600-400x200.jpg)
Which stolen data are ransomware gangs most likely to disclose?
If your organization gets hit by a ransomware gang that has also managed to steal company data before hitting the “encrypt” button, which types of data are more …
![Facepalm](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104156/facepalm-files-400x200.jpg)
Ransomware gang publishes stolen victim data on the public Internet
The Alphv (aka BlackCat) ransomware group is trying out a new tactic to push companies to pay for their post-breach silence: a clearnet (public Internet) website with …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/27102008/ransomware_1_26082021-400x200.jpg)
Ransomware attacks setting new records
Zscaler released the findings of its annual ThreatLabz Ransomware Report, which revealed an 80 percent increase in ransomware attacks year-over-year. In 2022, the most …
![RansomHouse](https://img.helpnetsecurity.com/wp-content/uploads/2022/05/24124528/ransomhouse-400x200.jpg)
RansomHouse: Bug bounty hunters gone rogue?
A new cybercrime outfit that calls itself RansomHouse is attempting to carve out a niche of the cyber extortion market for itself by hitting organizations, stealing their …
![Facepalm](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104156/facepalm-files-400x200.jpg)
Taking the right approach to data extortion
Cybercriminals often specialize. An extortion effort usually begins with a person or a team selecting targets in one of two ways: either they get a request from an …
![Okta](https://img.helpnetsecurity.com/wp-content/uploads/2022/03/23122305/okta-1495-400x200.jpg)
Microsoft and Okta confirm, detail impact of Lapsus$ gang’s attacks
Recent claims by the cyber extortion gang have been validated by Okta and Microsoft: Lapsus$ have managed to get their hands on some of Microsoft’s source code and have …
![Okta](https://img.helpnetsecurity.com/wp-content/uploads/2022/03/22112739/okta-1600-400x200.jpg)
Lapsus$ gang says it has breached Okta and Microsoft
After breaching NVIDIA and Samsung and stealing and leaking those companies’ propertary data, the Lapsus$ cyber extortion gang has announced that they have popped …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege