
SuperBlack: the new ransomware that will rock cybersecurity in 2025
The IT threat landscape has just welcomed a particularly worrisome new player. SuperBlack, a sophisticated ransomware that appeared in early 2025, is rapidly establishing itself
The IT threat landscape has just welcomed a particularly worrisome new player. SuperBlack, a sophisticated ransomware that appeared in early 2025, is rapidly establishing itself
More than 40,000 new computer vulnerabilities were discovered in 2024, a spectacular 38% increase on the previous year. Behind every CVE lies a potential entry
A surprise attack on one of the most powerful cybercrime groups In a stunning turn of events, the LockBit ransomware group, long considered a formidable
When ransomware strikes, the impact is immediate: locked files, interrupted activity and a daunting ransom message on your screens… This worrying situation nevertheless offers several
The cyberthreat landscape continues to evolve, with malicious actors becoming ever more determined and organized. Among these groups, the Qilin ransomware has emerged as one
A Colombian architect recently contacted us after a particularly destructive attack on his Synology storage system. The attackers had not only encrypted his data, as
As you know, cybersecurity threats are constantly evolving, and new players are appearing all the time. Today, we’re focusing on Akira, a ransomware group that
ShadowProtect is a disk-to-disk backup and recovery solution from Arcserve (formerly StorageCraft). It stands out for its speed, flexibility and reliability, but it is not
Known as far back as June 2022, the Play (or PlayCrypt) ransomware is a leading malicious actor spreading terror across the digital landscape. The Play
Backups are valuable safety nets for protecting your data. However, sometimes these backups are compromised or present vulnerabilities. In this article, we take a look
January 2025 saw a dynamic shift in ransomware activity, characterized by the resurgence of established ransomware groups, the emergence of new players and increasingly sophisticated
Cybersecurity threats continue to diversify, and attack techniques are evolving to circumvent the protections in place. Among these new forms of attack, doubleclickjacking stands out