IT Security News
Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel
EN, www.infosecurity-magazine.com

LockBit Admins Tease a New Ransomware Version

2024-12-20 13:12

The LockBitSupp persona said LockBit 4.0 will be launched in February 2025

This article has been indexed from www.infosecurity-magazine.com

Read the original article:

LockBit Admins Tease a New Ransomware Version

Tags: EN www.infosecurity-magazine.com

Post navigation

← Ukraine’s Security Service Probes GRU-Linked Cyber-Attack on State Registers
CISA: Use Signal or other secure communications app →

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel

Recent Posts

  • Akamai and Bitmovin: Revolutionizing Live and On-Demand Video Streaming August 13, 2025
  • GitHub Abuse Engine: Stay One Step Ahead August 13, 2025
  • A year after Altman said superintelligence was imminent, GPT-5 is all we get? August 13, 2025
  • Chinese SMS Spammers Go Mobile August 13, 2025
  • Tech Giant Google Introduces an Open-Source AI Agent to Automate Coding Activities August 13, 2025
  • The Limitations of Agentic AI in Cybersecurity: Why Large-Scale Autonomous Cyberattacks Aren’t Yet a Reality August 13, 2025
  • Web DDoS and App Exploitation Attacks Surge in First Half of 2025 August 13, 2025
  • Staffing Company Manpower Discloses Large-Scale Data Breach August 13, 2025
  • WinRAR Fixed A Zero-Day Flaw Exploited By RomCom August 13, 2025
  • Secure Private Connectivity Between VMware and Object Storage: An Enterprise Architecture Guide August 13, 2025
  • Why Perplexity is going after Google Chrome – and yes, it’s serious August 13, 2025
  • MadeYouReset: Turning HTTP/2 Server Against Itself August 13, 2025
  • New Charon Ransomware Employs DLL Sideloading, and Anti-EDR Capabilities to Attack Organizations August 13, 2025
  • Several Docker Images Contain Infamous XZ Backdoor Planted for More Than a Year August 13, 2025
  • FortiWeb Authentication Bypass Vulnerability Let Attackers Log in As Any Existing User August 13, 2025
  • Chipmaker Patch Tuesday: Many Vulnerabilities Addressed by Intel, AMD, Nvidia August 13, 2025
  • Microsoft fixes “BadSuccessor” Kerberos vulnerability (CVE-2025-53779) August 13, 2025
  • AI SOC 101: Key Capabilities Security Leaders Need to Know August 13, 2025
  • Fortinet Warns About FortiSIEM Vulnerability (CVE-2025-25256) With In-the-Wild Exploit Code August 13, 2025
  • The FinTech Arms Race August 13, 2025

Copyright © 2025 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}