Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Space Bears Ransomware: What You Need To Know

Space Bear is a relatively new ransomware group that first appeared on the radar in April 2024. The gang, which is aligned to the Phobos ransomware-as-a-service group, steals sensitive data from organisations, encrypts victims' computer systems, and demands that a ransom be paid for a decryption key or the data will be published on the dark web.

Under Siege: Ransomware and Healthcare

It’s becoming all too common these days: ransomware hitting another organization. However, most people don’t know exactly what happens when ransomware is found and what must be addressed. What makes it even more challenging for healthcare is that the data that can be stolen, like personal health information, is much more valuable than credit card numbers.

The Great Morpheus: New Extortion Group DLS Emerges

As 2025 progresses into its second week, it has not taken long for a new data-leak site (DLS) for an extortion group to emerge. December 2024 saw the emergence of LeakedData, FunkSec, and Bluebox. This week, the new group goes by the name Morpheus. Read on to find out what Cyjax knows about this new entrant into the extortion scene so far.

CIO POV: Ransomware and Resilience-2024's Biggest Cyber Stories

Let’s begin 2025 with an understatement about last year: 2024 was an eventful year for cybersecurity. That in itself is no surprise. The specifics, though, looked like this: AI use accelerated (for good and for bad), ransomware surged and relentless attacks on third parties shifted focus to cyber resilience.

How to scan for malware?

Imagine this: It's a typical Wednesday evening. You're scrolling through your photos, reminiscing about a recent vacation. Suddenly, your screen freezes. A message appears: “Your files are encrypted. Pay $5,000 in Bitcoin or lose everything forever.” This isn't a scene from a cyber thriller. It's the terrifying reality thousands of people face every single day.

Perimeter Security vs Cyber Resilience: CSPM vs DSPM

In this episode of Into the Breach, James Purvis is joined by Noam Perel to explore the key differences between CSPM (Cloud Security Posture Management) and DSPM (Data Security Posture Management). They dive into how these tools address different problems, their unique approaches to security, and why organizations benefit from leveraging both. Discover how DSPM’s data-centric approach complements CSPM’s infrastructure focus, the distinct personas driving each, and how together they provide a stronger, more resilient security posture.

CL0P Ransomware: The Latest Updates

Cl0p Ransomware, aka Cl0p, is a ransomware group that emerged in February 2019 and targeted most industries worldwide, including retail, transportation, education, manufacturing, automotive, energy, financial, telecommunications and even healthcare. The clop ransomware group is thought to be a successor of the CryptoMix ransomware group.

Mastering Ransomware Defense For Small Businesses

Ransomware poses a significant threat to small businesses by locking critical data and demanding hefty ransoms. Understanding the mechanisms and vulnerabilities exploited by cybercriminals is crucial in safeguarding your operations. This guide will walk you through practical steps to fortify your defenses, detect threats early and ensure swift recovery.