A ransomware gang exploited the critical React2Shell vulnerability (CVE-2025-55182) to gain initial access to corporate ...
The said since they provide IT support to the Information Commissioner, the Commissioner for Environmental Information, the ...
Ghana received strong recognition at the high-delegation Third African Forum on Cybercrime and Electronic Evidence when Mr. Dunstan Guba, a lead digital forensic expert from Wisconsin International ...
To clear Delivery Optimization files, open the Disk Cleanup tool using the search menu. Select your system drive, hit OK, and ...
Ransomware groups are targeting hypervisors to maximize impact, allowing a single breach to encrypt dozens of virtual ...
VolkLocker uses AES-256 in Galois/Counter Mode ( GCM) for encryption through Golang's "crypto/rand" package. Every encrypted ...
A new version of VolkLocker, wielded by the pro-Russia RaaS group CyberVolk, has some key enhancements but one fatal flaw.
CyberVolk is a relatively young, pro-Russian hacktivist collective that emerged in 2024.The group’s entire infrastructure is ...
A custom loader initiated the vulnerable driver, located targeted endpoint detection services then issued kernel-level ...
Sophos reports STAC6565 targeting nearly 40 victims, with 80% of attacks hitting Canadian firms and involving QWCrypt ...
Manufacturing organizations are becoming increasingly effective at stopping ransomware attacks before data can be encrypted, yet cybercriminals are countering these defenses by pivoting to data theft ...
Ransomware has quickly evolved to become one of the most formidable threats to African organisations. While prevention remains the ideal outcome, it’s no longer sufficient as a standalone strategy.