The ransomware family’s abuse of Polygon smart contracts echoes techniques recently seen in Ethereum-based attacks.
While ‘traditional’ ransomware attacks remain stable, some gangs are shifting towards exploiting zero-days and supply chains to go straight to stealing data ...
Cybersecurity researchers are becoming interested in a newly discovered ransomware strain called DeadLock that abuses Polygon ...
Group-IB warned about a new ransomware strain, DeadLock, using Polygon smart contracts for proxy server rotation. The malware ...
But for the researchers at Group-IB, the old-school encryption-only model is not the most notable aspect of the DeadLock ...
The Games in the Italian Alps are attracting hacktivists looking to reach billions of people and state-sponsored cyber-spies ...
A recently-discovered ransomware dubbed “DeadLock” is stealthily exploiting Polygon smart contracts to rotate and distribute ...
Discover how crypto malware operates through cryptojacking and ransomware, with real-world examples such as WannaMine and PowerGhost ...
Abstract "Double-extortion" ransomware attacks not only encrypt systems but also steal sensitive data. Traditional backups ...
University of Hawaii says a ransomware gang breached its Cancer Center in August 2025, stealing data of study participants, ...
New research from Trellix detailed that CrazyHunter ransomware has emerged as a serious and escalating threat, underscoring the growing sophistication of modern cybercriminal operations.
We’re pleased to collaborate with Elastio to strengthen data recovery assurance. Together, we are helping enterprises ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results