BERT ransomware targets Windows and Linux platforms, TGR-CRI-0045 exploits leaked machine keys to access organizations, and XWorm evolves into a modular and evasive remote access trojan.
Ever had your phone act like it has a mind of its own? Pop-ups? Sudden shutdowns? Your battery is draining in record time? You might be dealing with spyware. Watch this video to learn the signs of spyware and how to remove it from your device.
Since at least February 2025, Arctic Wolf has observed Interlock Remote Access Trojan (RAT) being deployed via social engineering techniques. Recently, The DFIR Report published a technical analysis of the Interlock RAT being delivered via a social engineering technique dubbed “FileFix.” The name FileFix is derived from its similarity to the previously documented ClickFix technique using fake CAPTCHA pages.
A cyber breach shouldn't bring critical patient care to a halt. That’s the idea behind the Minimum Viable Hospital, a model that ensures essential functions continue even under attack. Errol Weiss shares how leading healthcare systems are planning for resilience, and why smaller hospitals may struggle to keep up. He highlights how the standard response to healthcare cyberattacks overlooks the complex reality of delivering medical care. It’s time to recognize that cybersecurity isn’t just about systems, it’s about people.
KAWA4096, a ransomware whose name includes "Kawa", the Japanese word for "river", first emerged in June 2025. This new threat features a leak site that follows the style of the Akira ransomware group, and a ransom note format similar to Qilin’s, likely an attempt to further enrich their visibility and credibility. In this blog post, we’ll share key insights from an analyzed KAWA4096 sample to uncover how this ransomware operates and what sets it apart.
This report details an investigation into a Fast Flux network observed in 2024. It covers the technical details of the network, its observable infrastructure, the malware associated with it, and its presence on the dark web.
Among today's rising cyber threats, Pegasus spyware email has become one of the most famous names among the latest threats. Pegasus is a malware spy tool developed for extensive surveillance but has now been turned into the new wave of scams exerted by cybercriminals, especially through Pegasus spyware scam mails used to extort money from victims, claiming their devices had been hacked.
Ransomware is evolving—and it's targeting your blind spots. Attackers now encrypt files remotely over SMB shares using stolen credentials and unmanaged systems, bypassing traditional defenses. CrowdStrike closes this gap with File System Containment, a powerful Falcon Endpoint Security feature that detects ransomware-style behaviors like mass encryption and blocks destructive file actions instantly—directly at the endpoint, without relying on cloud checks or process termination.
The rules have changed. With cloud sprawl, BYOD, and evolving threats, your systems need more than defense, they need resilience. Learn why recovery matters just as much as prevention in today’s cybersecurity playbook.
Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each episode, we discuss cybersecurity with thought leaders and industry experts, getting their take on trends, themes, and how they see data security evolving. This is a must-listen for security and IT leaders looking to better understand trends shaping data security and how they can achieve cyber resilience.