Fog ransomware hackers are using an uncommon toolset, which includes open-source pentesting utilities and a legitimate employee monitoring software called Syteca. The Fog ransomware operation was ...
A new ransomware operator has emerged that relies on open source malware to launch double-extortion attacks that have claimed several victims. However, its ransomware has a flaw that gives victims a ...
Threat actors have started to use the Velociraptor digital forensics and incident response (DFIR) tool in attacks that deploy LockBit and Babuk ransomware. Cisco Talos researchers assess with medium ...