
Yurei ransomware: the ghost of open source code transformed into a formidable threat
September 5, 2025 marks the appearance of Yurei, a new ransomware group whose name evokes the spirits of Japanese folklore. This emergence illustrates a worrying
Cybersecurity is an essential area of IT that focuses on protecting systems, networks and data from digital threats. It encompasses a variety of practices, tools and technologies designed to prevent attacks, damage and unauthorized access to information and systems. As our dependence on digital technologies increases, the need to secure our digital information and infrastructures becomes ever more crucial.
Cybersecurity threats can take many forms, from malware such as viruses and ransomware to phishing attacks and data breaches. In the face of these ever-evolving threats, cybersecurity professionals are working tirelessly to develop new methods of defense, raise public and corporate awareness of the importance of digital security, and ensure a safer online environment for all.

September 5, 2025 marks the appearance of Yurei, a new ransomware group whose name evokes the spirits of Japanese folklore. This emergence illustrates a worrying

A new strain of ransomware dubbed HybridPetya was revealed by ESET Research researchers in September 2025. This sophisticated malware represents a worrying fusion between the

Cybercriminals are seizing on a new AI tool originally designed to strengthen cybersecurity to rapidly exploit zero-day vulnerabilities. This development marks another turning point in

On August 26, 2025,ESET researchers announced a significant discovery: PromptLock, the first known ransomware to use artificial intelligence to generate its malicious scripts in real

In August 2023, the Akira ransomware group reportedly compromised the IT systems of KNP Logistics, a historic British transport company founded in 1865. An intrusion

Cybercriminals are redoubling their ingenuity to bypass conventional protections, and the adoption of the FileFix technique by ransomware group Interlock perfectly illustrates this worrying trend.

RETEX: from the failure of the Akira decryptor to a tailor-made solution Background to the attack We were recently contacted on an urgent basis by

A critical vulnerability allows any domain user to remotely execute code on Veeam Backup & Replication servers attached to the domain – a nightmare for

More than 40,000 new computer vulnerabilities were discovered in 2024, a spectacular 38% increase on the previous year. Behind every CVE lies a potential entry

When ransomware strikes, the impact is immediate: locked files, interrupted activity and a daunting ransom message on your screens… This worrying situation nevertheless offers several

ShadowProtect is a disk-to-disk backup and recovery solution from Arcserve (formerly StorageCraft). It stands out for its speed, flexibility and reliability, but it is not

Backups are valuable safety nets for protecting your data. However, sometimes these backups are compromised or present vulnerabilities. In this article, we take a look