Ransomware has traditionally been associated with financially motivated cybercriminal groups. Increasingly, however, state-aligned actors are blending espionage with disruptive ransomware tactics. New ...
Medusa, operated by the Spearwing cybercrime group, emerged in 2023 as a ransomware-as-a-service (RaaS) platform. Affiliates ...
North Korean state-backed hackers associated with the Lazarus threat group are targeting U.S. healthcare organizations in ...
Lazarus Group used Medusa ransomware in Middle East and U.S. healthcare attacks, with average $260,000 demands and 366 ...
Threat actors claiming to represent the Medusa ransomware gang tempted a BBC correspondent to become an insider threat by offering a significant amount of money. Cybersecurity correspondent Joe Tidy ...
Hosted on MSN
Microsoft blames Medusa ransomware affiliates for GoAnywhere exploits while Fortra keeps head buriedYou can't find anything bad if you don't look, right? Medusa ransomware affiliates are among those exploiting a maximum-severity bug in Fortra's GoAnywhere managed file transfer (MFT) product, ...
A vulnerability in Fortra’s GoAnywhere Managed File Transfer (MFT) tool with a CVSS score of 10.0 is being actively exploited in ransomware attacks, Microsoft has warned. The tech giant published a ...
Hosted on MSN
Microsoft warns critical GoAnywhere security bug is being exploited by ransomware gang, so be on your guardCVE-2025-10035 in GoAnywhere MFT is being exploited by ransomware group Storm-1175 Vulnerability enables unauthenticated remote code execution; Medusa ransomware was deployed in at least one case ...
The tried-and-tested “business models” favoured by some of the world’s most adept, and dangerous, ransomware gangs are scaling rapidly as cyber criminals increasingly adopt structured affiliate models ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results