A closer look at the Medusa ransomware groupโs latest operations, including their evolving tactics and high-profile targets. Understand the current threat landscape and what defenders need to watch for.
#SecurityLand #BreachBreakdown #Ransomware #Medusa #RansomwareGroup #Cybercrime #Cybersecurity
Read More: https://www.security.land/inside-medusa-ransomware-tactics-targets-and-trends-in-recent-operations/

Inside Medusa Ransomware: Tactics, Targets, and Trends in Recent Operations
Inโdepth analysis of recent Medusa ransomware group operations, victim data and extortion schemes.
Security Land | Decoding the Cyber Threat Landscape
US cybersecurity experts indicted for BlackCat ransomware attacks
Three former employees of cybersecurity incident response companies DigitalMint and Sygnia have been indicted for allegedly hacking the networks of five U.S. companies in BlackCat (ALPHV) ransomware attacks between May 2023 and November 2023.
BleepingComputer๐จ#Lazarus escalated activities in 2025 with companies already suffering billions in losses.
This #APTโs attacks are evolving and getting harder to detect.
Read actionable report on its current campaigns to be ready for the next attack
#ransomwaregroup #Ransomware https://any.run/cybersecurity-blog/lazarus-group-attacks-2025/?utm_source=x_thehackernews&utm_medium=post&utm_campaign=lazarus&utm_content=blog&utm_term=160925

Lazarus Group Attacks in 2025: Overview for SOC Teams
Discover the current campaigns and malware of Lazarus Group and learn to detect its attacks in your SOC.
ANY.RUN's Cybersecurity Blog#LockBit ransomware gang has suffered a data breach after its dark web affiliate panels were defaced and replaced with a message linking to a MySQL database dump.
#ransomwaregroup #dataleaking https://www.bleepingcomputer.com/news/security/lockbit-ransomware-gang-hacked-victim-negotiations-exposed/ 
LockBit ransomware gang hacked, victim negotiations exposed
The LockBit ransomware gang has suffered a data breach after its dark web affiliate panels were defaced and replaced with a message linking to a MySQL database dump.
BleepingComputer#Akira ransomware gang was spotted using an unsecured webcam to launch encryption attacks on a victim's network, effectively circumventing Endpoint Detection and Response (EDR), which was blocking the encryptor in Windows.
#ransomwaregroup #CyberSecurity https://www.bleepingcomputer.com/news/security/ransomware-gang-encrypted-network-from-a-webcam-to-bypass-edr/ 
Ransomware gang encrypted network from a webcam to bypass EDR
The Akira ransomware gang was spotted using an unsecured webcam to launch encryption attacks on a victim's network, effectively circumventing Endpoint Detection and Response (EDR), which was blocking the encryptor in Windows.
BleepingComputerNew research has uncovered further links between the
#BlackBasta and
#Cactus ransomware gangs, with members of both groups utilizing the same social engineering attacks and the
#BackConnect proxy malware for post-exploitation access to corporate networks.
#ransomwaregroup https://www.bleepingcomputer.com/news/security/microsoft-teams-tactics-malware-connect-black-basta-cactus-ransomware/
Microsoft Teams tactics, malware connect Black Basta, Cactus ransomware
New research has uncovered further links between the Black Basta and Cactus ransomware gangs, with members of both groups utilizing the same social engineering attacks and the BackConnect proxy malware for post-exploitation access to corporate networks.
BleepingComputer
Black Basta ransomware gang's internal chat logs leak online
An unknown leaker has released what they claim to be an archive of internal Matrix chat logs belonging to the Black Basta ransomware operation.
BleepingComputerThe United States, Australia, and the United Kingdom have sanctioned Zservers, a Russia-based bulletproof hosting (BPH) services provider, for supplying essential attack infrastructure for the LockBit ransomware gang.
#LockBit #ransomwaregroup https://www.bleepingcomputer.com/news/security/us-sanctions-lockbit-ransomwares-bulletproof-hosting-provider/
US sanctions LockBit ransomwareโs bulletproof hosting provider
โThe United States, Australia, and the United Kingdom have sanctioned Zservers, a Russia-based bulletproof hosting (BPH) services provider, for supplying essential attack infrastructure for the LockBit ransomware gang.
BleepingComputerThe U.S. Justice Department announced the names of two Phobos ransomware affiliates arrested yesterday in Thailand, charging them on 11 counts due to their involvement in more than a thousand cyberattacks.
#ransomwaregroup https://www.bleepingcomputer.com/news/security/us-indicts-8base-ransomware-operators-for-phobos-encryption-attacks/
US indicts 8Base ransomware operators for Phobos encryption attacks
The U.S. Justice Department announced the names of two Phobos ransomware affiliates arrested yesterday in Thailand, charging them on 11 counts due to their involvement in more than a thousand cyberattacks.
BleepingComputerA global law enforcement operation targeting the Phobos ransomware gang has led to the arrest of four suspected hackers in Phuket, Thailand, and the seizure of 8Baseโs dark web sites. The suspects are accused of conducting cyberattacks on over 1,000 victims worldwide.
#ransomwaregroup https://www.bleepingcomputer.com/news/legal/police-arrests-4-phobos-ransomware-suspects-seizes-8base-sites/
Police arrests 4 Phobos ransomware suspects, seizes 8Base sites
A global law enforcement operation targeting the Phobos ransomware gang has led to the arrest of four suspected hackers in Phuket, Thailand, and the seizure of 8Base's dark web sites. The suspects are accused of conducting cyberattacks on over 1,000 victims worldwide.
BleepingComputer