The information was stolen from a legacy cloud file storage system, not from its payment processing platform.
The post Checkout.com Discloses Data Breach After Extortion Attempt appeared first on SecurityWeek.
The information was stolen from a legacy cloud file storage system, not from its payment processing platform.
The post Checkout.com Discloses Data Breach After Extortion Attempt appeared first on SecurityWeek.
The media company admitted that cybercriminals attempted to extort a payment after stealing personal information.
The post Washington Post Says Nearly 10,000 Employees Impacted by Oracle Hack appeared first on SecurityWeek.
Akira was seen exploiting SonicWall vulnerabilities and encrypting Nutanix Acropolis Hypervisor (AHV) VM disk files this year.
The post Akira Ransomware Group Made $244 Million in Ransom Proceeds appeared first on SecurityWeek.
A financially motivated threat actor automated the package publishing process in a coordinated tea.xyz token farming campaign.
The post Amazon Detects 150,000 NPM Packages in Worm-Powered Campaign appeared first on SecurityWeek.
85 active ransomware and extortion groups observed in Q3 2025, reflecting the most decentralized ransomware ecosystem to date.
1,590 victims disclosed across 85 leak sites, showing high, sustained activity despite law-enforcement pressure.
14 new ransomware brands launched this quarter, proving how quickly affiliates reconstitute after takedowns.
LockBit’s reappearance with
A vulnerability in ImunifyAV can be exploited for arbitrary code execution by uploading a malicious file to shared servers.
The post Imunify360 Vulnerability Could Expose Millions of Sites to Hacking appeared first on SecurityWeek.
