FinCEN reports $2.1B+ in ransomware payments from 2022–2024 across more than 4,000 incidents.

2023 showed the highest activity, driven by variants such as ALPHV, Akira, LockBit, Hive, and Black Basta.

97% of payments flowed through Bitcoin, often laundered via unregulated exchanges.
What factors do you think contributed most to the 2023 spike?

Source: https://therecord.media/fincen-treasury-2-billion-ransomware-payments-report

Follow us for more analytical cybersecurity reporting.

#InfoSec #Cybersecurity #Ransomware #ThreatIntel #FinCEN #Bitcoin #Cybercrime #SecurityAnalysis #MalwareTrends #TechNews #CyberRisk #DigitalSecurity

ClickFix operators are now using fake full-screen “Windows Update” pages to push victims into running malicious commands. Combined with steganographic loaders and in-memory execution, these campaigns continue to evolve.

What detection or user-training approach do you think works best today?

Source: https://www.helpnetsecurity.com/2025/11/25/fake-windows-update-screen-clickfix/

Follow @technadu for ongoing threat-intel breakdowns and practical defense insights.

#Infosec #ThreatIntel #ClickFix #EDR #CyberHygiene #MalwareTrends #SecurityOps #WindowsSecurity #InfoStealer

Gootloader’s back—and it’s smarter. The new GootBot variant is evading defenses and targeting industries like healthcare. Are we ready for what’s next?

https://thedefendopsdiaries.com/gootloaders-evolving-threat-new-tactics-targets-and-defensive-strategies-in-2024/

#gootloader
#malwaretrends
#cybersecurity2024
#threatintelligence
#infosec
#gootbot
#seoattacks
#healthcaresecurity
#ransomware

Gootloader’s Evolving Threat: New Tactics, Targets, and Defensive Strategies in 2024

Explore Gootloader’s latest tactics, new GootBot variant, targeted industries, and essential defense strategies for organizations in 2024.

The DefendOps Diaries

Gootloader is back with a vengeance—this time featuring the stealthy GootBot that spreads through networks and ups its SEO poisoning game. With targets from legal to healthcare, are we ready for its next-gen tactics?

https://thedefendopsdiaries.com/gootloaders-evolving-threat-new-tactics-targets-and-defensive-strategies-in-2024/

#gootloader
#malwaretrends
#cybersecurity2024
#threatintelligence
#infosec
#gootbot
#seoattacks
#healthcaresecurity
#ransomware

Gootloader’s Evolving Threat: New Tactics, Targets, and Defensive Strategies in 2024

Explore Gootloader’s latest tactics, new GootBot variant, targeted industries, and essential defense strategies for organizations in 2024.

The DefendOps Diaries

GlassWorm is turning open-source security on its head—by exploiting trust in our favorite code registries, this self-spreading malware could change everything we thought we knew about digital safety. What’s next for our tech landscape?

https://thedefendopsdiaries.com/glassworm-and-the-future-of-open-source-security-lessons-from-a-self-spreading-malware-attack/

#glassworm
#opensourcesecurity
#malwaretrends
#cybersecurity2025
#vscode
#threatintelligence
#softwaresecurity
#infosec

As 2024 wraps up, top malware techniques include:

• Disabling Windows Event Logging
• PowerShell Exploitation
• Abuse of Windows Command Shell
• Modifying Registry Run Keys
• Time-Based Evasion

Think 2025.

#Cybersecurity2024 #MalwareTrends

👉 https://zurl.co/MIZ5

5 Most Common Malware Techniques in 2024

ANY.RUN's Q3 2024 report reveals malware's top techniques, from disabling event logs to using PowerShell

The Hacker News