Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

New FileFix Delivery Method Used to Distribute Interlock RAT

Since at least February 2025, Arctic Wolf has observed Interlock Remote Access Trojan (RAT) being deployed via social engineering techniques. Recently, The DFIR Report published a technical analysis of the Interlock RAT being delivered via a social engineering technique dubbed “FileFix.” The name FileFix is derived from its similarity to the previously documented ClickFix technique using fake CAPTCHA pages.

Can Your Hospital Keep Running During a Cyberattack?

A cyber breach shouldn't bring critical patient care to a halt. That’s the idea behind the Minimum Viable Hospital, a model that ensures essential functions continue even under attack. Errol Weiss shares how leading healthcare systems are planning for resilience, and why smaller hospitals may struggle to keep up. He highlights how the standard response to healthcare cyberattacks overlooks the complex reality of delivering medical care. It’s time to recognize that cybersecurity isn’t just about systems, it’s about people.

KAWA4096's Ransomware Tide: Rising Threat With Borrowed Styles

KAWA4096, a ransomware whose name includes "Kawa", the Japanese word for "river", first emerged in June 2025. This new threat features a leak site that follows the style of the Akira ransomware group, and a ransom note format similar to Qilin’s, likely an attempt to further enrich their visibility and credibility. In this blog post, we’ll share key insights from an analyzed KAWA4096 sample to uncover how this ransomware operates and what sets it apart.

Pegasus Spyware Email Scam: How to Detect and Protect Yourself

Among today's rising cyber threats, Pegasus spyware email has become one of the most famous names among the latest threats. Pegasus is a malware spy tool developed for extensive surveillance but has now been turned into the new wave of scams exerted by cybercriminals, especially through Pegasus spyware scam mails used to extort money from victims, claiming their devices had been hacked.

Stop Ransomware Over SMB with Falcon Endpoint Security: Demo Drill Down

Ransomware is evolving—and it's targeting your blind spots. Attackers now encrypt files remotely over SMB shares using stolen credentials and unmanaged systems, bypassing traditional defenses. CrowdStrike closes this gap with File System Containment, a powerful Falcon Endpoint Security feature that detects ransomware-style behaviors like mass encryption and blocks destructive file actions instantly—directly at the endpoint, without relying on cloud checks or process termination.

HIPAA 2.0, Minimum Viable Hospitals, and Strategies for Cyber Resilience within Healthcare

Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each episode, we discuss cybersecurity with thought leaders and industry experts, getting their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience.