#ransom : the release of a captive, or of captured property, by payment of a consideration

- French: rançon

- German: das Lösegeld

- Italian: riscatto

- Portuguese: resgate

- Spanish: rescate

------------

Try Christian's word chain building game @ https://wordwallgame.com

Word Wall

نیشنل سائبر کرائم انوسٹی گیشن ایجنسی (این سی سی آئی اے) راولپنڈی کی بڑی کارروائی، خاتون کو آن لائن بلیک میل کرنے والا ملزم اسلام آباد سے گرفتار۔ ڈپٹی ڈائریکٹر مدثر شاہ کی نگرانی میں سب انسپکٹر امجد بلال کی ٹیم نے ساہیوال سے تعلق رکھنے والے ملزم عمیر ادریس کو حراست میں لے لیا۔ ملزم پر جعلی انسٹاگرام آئی ڈی اور نازیبا ویڈیوز کے ذریعے خاتون کو ہراساں کرنے کا الزام۔

#blackmail #woman #vulger #video #ncci #pakistan #rawalpindi #ransom

20-Year-Old Enters Prison for Historic Breach, Ransoming of Massive Student Database - Slashdot

20-year-old Matthew Lane sent a text message to ABC News as his parents drove him to federal prison in Connecticut. "I'm just scared," he said, calling the whole situation "extremely sad." Barely a year earlier, while still a teenager, he helped launch what's been described as the biggest cyberat...

'Addicted to hacking': Young hacker behind historic breach speaks out for 1st time, before reporting to prison - ABC News https://abcnews.com/US/addicted-hacking-young-hacker-historic-breach-speaks-1st/story?id=131855776 #cybersecurity #cybercrime #PowerSchool #ransom

NEW: A Silent Threat, Loud Consequences: Ransom Group Hits Law Firms Hard

#SilentRansomGroup has leaked data from 38 law firms so far -- and they tell me most law firms do pay them. That means.... (counting on fingers and toes...) they've hit a heckuva lot of law firms.

And I'm beginning to get a feel for how their negotiations go when they fail.

Read about their attack on Wood Smith Henning & Berman at:

https://databreaches.net/2026/04/13/a-silent-threat-loud-consequences-ransom-group-hits-law-firms-hard/

#hackandleak #ransom #cybersec #infosec #databreach

A Silent Threat, Loud Consequences: Ransom Group Hits Law Firms Hard - DataBreaches.Net

When the FBI issued a Private Industry Notice in May 2025 about the Silent Ransom Group (SRG) targeting law firms , they were not exaggerating. The image on the

DataBreaches.Net

Wynn Resorts Says 21,000 Employees Affected by ShinyHunters Hack

Wynn Resorts confirmed in late February that hackers had obtained employee data - including SSNs.

The hackers had reportedly sought a ransom of more than 22 bitcoin (roughly $1.5 million).

#Wynn #ransom #shinyhunters #dataleak #databreach #security #cybersecurity #hackers #hacking #hacked

https://www.securityweek.com/wynn-resorts-says-21000-employees-affected-by-shinyhunters-hack/

Wynn Resorts Says 21,000 Employees Affected by ShinyHunters Hack

High-end casino and hotel operator Wynn Resorts says more than 21,000 individuals are affected by the recently disclosed data breach.

SecurityWeek
New ransom notes in the Nancy Guthrie case claim the missing 84-year-old is dead, with a sender demanding bitcoin to reveal her body’s location and alleged kidnapper. https://english.mathrubhumi.com/news/world/nancy-guthrie-dead-bitcoin-ransom-location-kidnapper-s2klmaib?utm_source=dlvr.it&utm_medium=mastodon #NancyGuthrie #SavannahGuthrie #Kidnapping #Ransom

When people keep advising victims not to pay ransom because threat actors can't be trusted to really delete all the data, my inner researcher kicks in and wants to know how often that really happens.

So I started sending out inquiries.

Now you might think that those who publicly and repeatedly urge journalists to "spread the word" not to pay would respond and share some of their experiences with untrustworthy threat actors, but no..... they didn't even respond.

Read about the replies I did get, because they really surprised me.

I have no doubt that some professionals will hate what I have reported, but then, perhaps they should have responded, too, if they think differently.

How often do threat actors default on promises to delete data?
https://databreaches.net/2026/04/05/how-often-do-threat-actors-default-on-promises-to-delete-data/

#databreach #incidentresponse #ransom

@zackwhittaker @campuscodi @euroinfosec @lawrenceabrams @jgreig @securityaffairs @Hackread @h4ckernews

I am a big fan of BakerHostetler's annual data security incident response reports because they are based on actual client experiences and data.

I just posted about their 2026 report, and commented on their healthcare sector data. As I had mentioned to @siguza, healthcare breaches tend to get higher ransom demands and higher settlements. Take a look at the 2025 data -- the highest initial ransom demand for a health entity client was $98M.

I'd love to know who the victim was and what TA or group demanded that much.

That said, the highest ransom actually paid for a healthcare sector breach by one of their clients last year was $5M.

Big delta.

My post: https://databreaches.net/2026/04/03/bakerhostetlers-2026-report-findings-from-1250-clients-breach-experiences-in-2025/

#ransomware #healthsec #incidentresponse #statistics #phishing #ransom #malware #databreach #cybersecurity

@campuscodi @amvinfe

Cyber sleuths uncover nefarious techniques to take malware (dubbed Omnistealer) posted in GitHub and use social engineering techniques to get it embedded into blockchains where the malware may be stored forever and make it difficult to root out as the chains grow.

"Hiding malicious payloads within blockchain has become an emerging obfuscation technique."

Omnistealer is capable of stealing cryptocurrency, passwords and privileged credentials for accessing an organization's information. https://www.pcmag.com/news/malware-is-sleeping-on-the-blockchain-and-its-already-infected-dozens-of #CyberSecurity #Ransom-ISAC #Security #CyberAttack #Malware #BlockChain #GitHub #FakeJobs #FakeRecruiters #JobInterviews #OmniStealer #Cyber #SocialEngineering