IT Security News
Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel
EN, www.infosecurity-magazine.com

LockBit, Black Basta, Play Dominate Ransomware in Q1 2024

2024-05-01 17:05

The data from ReliaQuest also suggests LockBit faced a significant setback due to law enforcement action

This article has been indexed from www.infosecurity-magazine.com

Read the original article:

LockBit, Black Basta, Play Dominate Ransomware in Q1 2024

Tags: EN www.infosecurity-magazine.com

Post navigation

← Spoofing Shein for Credential Harvesting
Zero-Day Nightmare: Palo Alto, Cisco, and MITRE Under Attack →

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel

Recent Posts

  • Anthropic takes on OpenAI and Google with new Claude AI features designed for students and developers August 14, 2025
  • Siemens SINEC Traffic Analyzer August 14, 2025
  • Siemens SIMATIC RTLS Locating Manager August 14, 2025
  • Siemens SIPROTEC 4 and SIPROTEC 4 Compact August 14, 2025
  • Siemens RUGGEDCOM ROX II August 14, 2025
  • Siemens COMOS August 14, 2025
  • What Is Zero Trust, Really? August 14, 2025
  • IT Security News Hourly Summary 2025-08-14 18h : 9 posts August 14, 2025
  • Why the Browser Is Becoming a Prime Security Battleground August 14, 2025
  • Google Mandates License or Certification for Crypto App Developers August 14, 2025
  • Threat Actors Use Advanced Tactics to Personalize Phishing for Malware Delivery August 14, 2025
  • Fortinet VPNs Under Coordinated Attack August 14, 2025
  • Romance scammers in Ghana charged with more than $100 million in theft August 14, 2025
  • BtcTurk suspends operations amid alleged $49M hot wallet heist August 14, 2025
  • New HTTP/2 ‘MadeYouReset’ Vulnerability Enables Large-Scale DoS Attacks August 14, 2025
  • Hackers Exploit Microsoft Flaw to Breach Canadian House of Commons to Gain Unauthorized Access August 14, 2025
  • Rockwell Automation ControlLogix Ethernet Modules August 14, 2025
  • Rockwell FactoryTalk Linx August 14, 2025
  • Rockwell Automation FactoryTalk Viewpoint August 14, 2025
  • Rockwell Automation 1756-ENT2R, 1756-EN4TR, 1756-EN4TRXT August 14, 2025

Copyright © 2025 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}