A ransomware attack has forced the University of Mississippi Medical Center to close all clinics and cancel elective ...
The U.S. Department of Justice charged another former DigitalMint employee for his involvement in an insider scheme in which ...
The attack was launched on Thursday and prompted hospital officials to close all of its 35 clinics across the state.
Cybercriminals are happy to target almost any industry where data can be stolen. In many cases, less prepared and less security-focused companies are simply easier targets. A recent ransomware attack ...
Ransomware attacks rose sharply overall but leveled off in education: Global ransomware incidents increased 32% in 2025, while attacks on education institutions rose just 2%, suggesting a temporary ...
Add Yahoo as a preferred source to see more of our stories on Google. Ransomware depicted among lines of code. In 2025, there were 251 ransomware attacks on educational institutions worldwide — of ...
A new malware strain dubbed Slopoly, likely created using generative AI tools, allowed a threat actor to remain on a compromised server for more than a week and steal data in an Interlock ransomware ...
A new report finds healthcare organizations face heightened ransomware risk during holidays, weekends, and corporate transitions as attackers exploit reduced staffing and system vulnerabilities. The ...
AI-generated Slopoly malware used by Hive0163 in 2026 attacks maintained access for over a week, highlighting how AI ...
We collaborate with the world's leading lawyers to deliver news tailored for you. Sign Up for any (or all) of our 25+ Newsletters. Some states have laws and ethical rules regarding solicitation and ...
What’s new. As the frequency and sophistication of ransomware attacks increase, corporate responses to these incidents are subject to ever-growing regulation, and enforcement actions are becoming more ...
Attackers are shifting from smash-and-grab operations to “parasitic” residency. CISOs must emphasize identity controls, monitor trusted applications and integrations, and focused detection strategies ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results