
Akira: understanding and countering a ransomware that will be very active in 2025
As you know, cybersecurity threats are constantly evolving, and new players are appearing all the time. Today, we’re focusing on Akira, a ransomware group that
As you know, cybersecurity threats are constantly evolving, and new players are appearing all the time. Today, we’re focusing on Akira, a ransomware group that
ShadowProtect is a disk-to-disk backup and recovery solution from Arcserve (formerly StorageCraft). It stands out for its speed, flexibility and reliability, but it is not
Known as far back as June 2022, the Play (or PlayCrypt) ransomware is a leading malicious actor spreading terror across the digital landscape. The Play
Backups are valuable safety nets for protecting your data. However, sometimes these backups are compromised or present vulnerabilities. In this article, we take a look
January 2025 saw a dynamic shift in ransomware activity, characterized by the resurgence of established ransomware groups, the emergence of new players and increasingly sophisticated
Cybersecurity threats continue to diversify, and attack techniques are evolving to circumvent the protections in place. Among these new forms of attack, doubleclickjacking stands out
Phishing attacks are one of the most serious threats to cybersecurity today. The constant evolution of techniques used by cybercriminals makes these attacks increasingly difficult
The Norauto chain, renowned for its car maintenance services, confirmed to an AFP journalist on Tuesday that it had been the victim ofa data leak
A joint report published by CISA, the FBI and the NSA, with the support of members of the Five Eyes alliance (USA, Australia, Canada, New
The CVE-2024-40711 vulnerability discovered in Veeam Backup & Replication continues to wreak havoc on unpatched systems. While this flaw had already enabled the Akira and
Schneider Electric, the French energy management and automation giant, is facing a new cyber crisis. This global leader in energy solutions, which covers a range
With threats such as ransomware and other cyber attacks on the increase, it has become essential to adopt innovative methods to protect sensitive data. Zero