![](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102817/badrabbit-payment-400x200.jpg)
NotPetya successor Bad Rabbit hits orgs in Russia, Ukraine
Bad Rabbit ransomware, apparently modeled on NotPetya, has hit a number of organizations across Russia, Ukraine, and Eastern Europe on Tuesday. Russian security outfit …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112750/bomb-400x200.jpg)
Another Ukrainian software maker’s site compromised to spread malware
The web server of Crystal Finance Millennium, a Ukraine-based accounting software firm, has been compromised and made to host different types of malware. The discovery of the …
![Keyboard](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103812/keyboard-sky-400x200.jpg)
NotPetya outbreak: What we know so far
Tuesday’s ransomware outbreak hit many businesses and government entities around the world, but by far the most numerous victims are located in Ukraine. The infection …
![Skull](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103817/skull-ascii-400x200.jpg)
Explosive global attack delivers destructive Petya ransomware
Less than two months after the disastrous, global WannaCry infestation, a variant of the Petya ransomware dubbed PetrWrap has started hitting companies in Ukraine, Russia and …
![Glass](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195442/glass-582689_1280-400x200.jpg)
BlackEnergy APT is back, deleting files and killing computer systems
The BlackEnergy APT – or SandWorm group, as some researchers call it – has been active since 2007 (at least). Its past exploits include cyber-espionage campaigns …
Is Ukraine the perfect place for hackers?
What is it that makes the Ukraine such a fitting refuge for hackers and cyber crooks? According to a number of well-informed individuals, it is a combination of inadequate …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD