Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
ransomware
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Germany's Public Attribution of 'UNKN' Raises Questions About Intelligence Use, Not Criminal Disruption
RC
RC
RC
Follow
Apr 20
Germany's Public Attribution of 'UNKN' Raises Questions About Intelligence Use, Not Criminal Disruption
#
cybersecurity
#
ransomware
#
threatintelligence
#
publicattribution
Comments
Add Comment
2 min read
Port 3389 to the World: How to Lose Your Company Data Over the Weekend
Hugo | DevOps | Cybersecurity
Hugo | DevOps | Cybersecurity
Hugo | DevOps | Cybersecurity
Follow
Apr 16
Port 3389 to the World: How to Lose Your Company Data Over the Weekend
#
cybersecurity
#
windows
#
rdp
#
ransomware
2
 reactions
Comments
Add Comment
3 min read
Ransomware Attacks Hit Record High. Payments Just Collapsed.
Derivinate
Derivinate
Derivinate
Follow
Mar 18
Ransomware Attacks Hit Record High. Payments Just Collapsed.
#
ransomware
#
cybersecurity
#
cybercrimeeconomics
#
infrastructure
1
 reaction
Comments
Add Comment
8 min read
Ransomware vs. Wiper Attacks: Know the Difference
Oscar Six Security
Oscar Six Security
Oscar Six Security
Follow
Mar 16
Ransomware vs. Wiper Attacks: Know the Difference
#
ransomware
#
wiperattack
#
datadestruction
#
incidentresponse
Comments
Add Comment
5 min read
Advanced Cybersecurity: How Attackers Break In and How to Stop Them
Abhishek Nair
Abhishek Nair
Abhishek Nair
Follow
Mar 15
Advanced Cybersecurity: How Attackers Break In and How to Stop Them
#
cybersecurity
#
phishing
#
ransomware
#
socialengineering
Comments
Add Comment
12 min read
Ransomware's Real Threat: Not the Ransom, the Extortion
Derivinate
Derivinate
Derivinate
Follow
Mar 14
Ransomware's Real Threat: Not the Ransom, the Extortion
#
ransomware
#
cybersecurity
#
extortion
#
doubleextortion
1
 reaction
Comments
Add Comment
7 min read
Schrödinger's Backup: If You Haven't Tested a Restore, You Don't Have a Backup
Hugo | DevOps | Cybersecurity
Hugo | DevOps | Cybersecurity
Hugo | DevOps | Cybersecurity
Follow
Apr 14
Schrödinger's Backup: If You Haven't Tested a Restore, You Don't Have a Backup
#
cybersecurity
#
disasterrecovery
#
backups
#
ransomware
25
 reactions
Comments
Add Comment
3 min read
Fake IT Support Emails Deploy Havoc C2 Framework as Gateway to Ransomware
DeepSeaX
DeepSeaX
DeepSeaX
Follow
Mar 4
Fake IT Support Emails Deploy Havoc C2 Framework as Gateway to Ransomware
#
ransomware
#
socialengineering
#
c2framework
#
incidentresponse
Comments
Add Comment
4 min read
Project Compass: Europol Dismantles The Com Teen Cybercrime Network
DeepSeaX
DeepSeaX
DeepSeaX
Follow
Mar 3
Project Compass: Europol Dismantles The Com Teen Cybercrime Network
#
scatteredspider
#
europol
#
ransomware
#
socialengineering
Comments
Add Comment
4 min read
Rise of the Digital Parasite: Why Ransomware Groups Stopped Encrypting Your Files in 2026
DeepSeaX
DeepSeaX
DeepSeaX
Follow
Feb 27
Rise of the Digital Parasite: Why Ransomware Groups Stopped Encrypting Your Files in 2026
#
ransomware
#
cybersecurity
#
threathunting
#
mitreattack
1
 reaction
Comments
Add Comment
4 min read
North Korea Is Now a Ransomware Affiliate — Lazarus Group Joins Medusa RaaS
DeepSeaX
DeepSeaX
DeepSeaX
Follow
Feb 25
North Korea Is Now a Ransomware Affiliate — Lazarus Group Joins Medusa RaaS
#
security
#
cybersecurity
#
ransomware
#
infosec
Comments
Add Comment
3 min read
Steaelite's Next Move: Why Supply Chain API Attacks Will Define Q2 2026
Tiamat
Tiamat
Tiamat
Follow
Mar 10
Steaelite's Next Move: Why Supply Chain API Attacks Will Define Q2 2026
#
cybersecurity
#
ransomware
#
api
#
devops
Comments
Add Comment
4 min read
Supply Chain Ransomware: Why Your Vendor's Update Is Your Network's Backdoor
Tiamat
Tiamat
Tiamat
Follow
Mar 9
Supply Chain Ransomware: Why Your Vendor's Update Is Your Network's Backdoor
#
supplychain
#
ransomware
#
vendorsecurity
#
updates
Comments
Add Comment
5 min read
VMware ESXi Ransomware: Chinese APT Exploiting 2-Year-Old Kernel Escape Vulnerabilities
Tiamat
Tiamat
Tiamat
Follow
Mar 9
VMware ESXi Ransomware: Chinese APT Exploiting 2-Year-Old Kernel Escape Vulnerabilities
#
vmware
#
cybersecurity
#
ransomware
#
exploit
Comments
Add Comment
5 min read
Energy Grid Cyberattacks: Why SCADA Systems Are the Next Ransomware Target
Tiamat
Tiamat
Tiamat
Follow
Mar 9
Energy Grid Cyberattacks: Why SCADA Systems Are the Next Ransomware Target
#
cybersecurity
#
energy
#
scada
#
ransomware
Comments
Add Comment
5 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account