home.social

#ransom โ€” Public Fediverse posts

Live and recent posts from across the Fediverse tagged #ransom, aggregated by home.social.

  1. ๐‘๐š๐ง๐ฌ๐จ๐ฆ๐ฐ๐š๐ซ๐ž, ๐“๐ซ๐š๐ง๐ฌ๐ฉ๐š๐ซ๐ž๐ง๐œ๐ฒ, ๐š๐ง๐ ๐ˆ๐ง๐ฏ๐ข๐ฌ๐ข๐›๐ฅ๐ž ๐•๐ข๐œ๐ญ๐ข๐ฆ๐ฌ: ๐ƒ๐ข๐ฌ๐ฌ๐ž๐ง๐ญ ๐‘๐ž๐ฌ๐ฉ๐จ๐ง๐๐ฌ ๐ญ๐จ ๐ญ๐ก๐ž ๐ˆ๐ง๐ฌ๐ญ๐ซ๐ฎ๐œ๐ญ๐ฎ๐ซ๐ž ๐‚๐š๐ฌ๐ž

    A recent article published by DataBreaches.net by journalist Dissent addresses one of the most controversial issues in modern cybersecurity: the payment of ransoms following a cyberattack and the consequences such decisions can have not only on the companies involved, but also on the individuals whose data has been compromised.

    suspectfile.com/ransomware-tra

    #Canvas #Data_Breach #Instructure #Navigate360 #Ransom #Ransomware #ShinyHunters

  2. ๐‘๐š๐ง๐ฌ๐จ๐ฆ๐ฐ๐š๐ซ๐ž, ๐“๐ซ๐š๐ง๐ฌ๐ฉ๐š๐ซ๐ž๐ง๐œ๐ฒ, ๐š๐ง๐ ๐ˆ๐ง๐ฏ๐ข๐ฌ๐ข๐›๐ฅ๐ž ๐•๐ข๐œ๐ญ๐ข๐ฆ๐ฌ: ๐ƒ๐ข๐ฌ๐ฌ๐ž๐ง๐ญ ๐‘๐ž๐ฌ๐ฉ๐จ๐ง๐๐ฌ ๐ญ๐จ ๐ญ๐ก๐ž ๐ˆ๐ง๐ฌ๐ญ๐ซ๐ฎ๐œ๐ญ๐ฎ๐ซ๐ž ๐‚๐š๐ฌ๐ž

    A recent article published by DataBreaches.net by journalist Dissent addresses one of the most controversial issues in modern cybersecurity: the payment of ransoms following a cyberattack and the consequences such decisions can have not only on the companies involved, but also on the individuals whose data has been compromised.

    suspectfile.com/ransomware-tra

    #Canvas #Data_Breach #Instructure #Navigate360 #Ransom #Ransomware #ShinyHunters

  3. ๐‘๐š๐ง๐ฌ๐จ๐ฆ๐ฐ๐š๐ซ๐ž, ๐“๐ซ๐š๐ง๐ฌ๐ฉ๐š๐ซ๐ž๐ง๐œ๐ฒ, ๐š๐ง๐ ๐ˆ๐ง๐ฏ๐ข๐ฌ๐ข๐›๐ฅ๐ž ๐•๐ข๐œ๐ญ๐ข๐ฆ๐ฌ: ๐ƒ๐ข๐ฌ๐ฌ๐ž๐ง๐ญ ๐‘๐ž๐ฌ๐ฉ๐จ๐ง๐๐ฌ ๐ญ๐จ ๐ญ๐ก๐ž ๐ˆ๐ง๐ฌ๐ญ๐ซ๐ฎ๐œ๐ญ๐ฎ๐ซ๐ž ๐‚๐š๐ฌ๐ž

    A recent article published by DataBreaches.net by journalist Dissent addresses one of the most controversial issues in modern cybersecurity: the payment of ransoms following a cyberattack and the consequences such decisions can have not only on the companies involved, but also on the individuals whose data has been compromised.

    suspectfile.com/ransomware-tra

    #Canvas #Data_Breach #Instructure #Navigate360 #Ransom #Ransomware #ShinyHunters

  4. ๐‘๐š๐ง๐ฌ๐จ๐ฆ๐ฐ๐š๐ซ๐ž, ๐“๐ซ๐š๐ง๐ฌ๐ฉ๐š๐ซ๐ž๐ง๐œ๐ฒ, ๐š๐ง๐ ๐ˆ๐ง๐ฏ๐ข๐ฌ๐ข๐›๐ฅ๐ž ๐•๐ข๐œ๐ญ๐ข๐ฆ๐ฌ: ๐ƒ๐ข๐ฌ๐ฌ๐ž๐ง๐ญ ๐‘๐ž๐ฌ๐ฉ๐จ๐ง๐๐ฌ ๐ญ๐จ ๐ญ๐ก๐ž ๐ˆ๐ง๐ฌ๐ญ๐ซ๐ฎ๐œ๐ญ๐ฎ๐ซ๐ž ๐‚๐š๐ฌ๐ž

    A recent article published by DataBreaches.net by journalist Dissent addresses one of the most controversial issues in modern cybersecurity: the payment of ransoms following a cyberattack and the consequences such decisions can have not only on the companies involved, but also on the individuals whose data has been compromised.

    suspectfile.com/ransomware-tra

    #Canvas #Data_Breach #Instructure #Navigate360 #Ransom #Ransomware #ShinyHunters

  5. ๐‘๐š๐ง๐ฌ๐จ๐ฆ๐ฐ๐š๐ซ๐ž, ๐“๐ซ๐š๐ง๐ฌ๐ฉ๐š๐ซ๐ž๐ง๐œ๐ฒ, ๐š๐ง๐ ๐ˆ๐ง๐ฏ๐ข๐ฌ๐ข๐›๐ฅ๐ž ๐•๐ข๐œ๐ญ๐ข๐ฆ๐ฌ: ๐ƒ๐ข๐ฌ๐ฌ๐ž๐ง๐ญ ๐‘๐ž๐ฌ๐ฉ๐จ๐ง๐๐ฌ ๐ญ๐จ ๐ญ๐ก๐ž ๐ˆ๐ง๐ฌ๐ญ๐ซ๐ฎ๐œ๐ญ๐ฎ๐ซ๐ž ๐‚๐š๐ฌ๐ž

    A recent article published by DataBreaches.net by journalist Dissent addresses one of the most controversial issues in modern cybersecurity: the payment of ransoms following a cyberattack and the consequences such decisions can have not only on the companies involved, but also on the individuals whose data has been compromised.

    suspectfile.com/ransomware-tra

    #Canvas #Data_Breach #Instructure #Navigate360 #Ransom #Ransomware #ShinyHunters

  6. "Agreement:" reached in ShinyHunter's breach of Infrastructure's Canvas LMS .... the cybercrime gang returned the stolen data (which includes usernames, email addresses, course names, enrollment information, and messages) and provided shred logs confirming its destruction.

    While not confirmed, it looks like a ransom payment was made. A webinar on May 13 may provide more details. instructure.com/incident_update #Breach #Hackers #ShinyHunters #Infrastructure #CanvasLMS #LMS #StudentData #DataPrivacy #Ransom #RansomWare #CyberCrime

  7. "Agreement:" reached in ShinyHunter's breach of Infrastructure's Canvas LMS .... the cybercrime gang returned the stolen data (which includes usernames, email addresses, course names, enrollment information, and messages) and provided shred logs confirming its destruction.

    While not confirmed, it looks like a ransom payment was made. A webinar on May 13 may provide more details. instructure.com/incident_update #Breach #Hackers #ShinyHunters #Infrastructure #CanvasLMS #LMS #StudentData #DataPrivacy #Ransom #RansomWare #CyberCrime

  8. "Agreement:" reached in ShinyHunter's breach of Infrastructure's Canvas LMS .... the cybercrime gang returned the stolen data (which includes usernames, email addresses, course names, enrollment information, and messages) and provided shred logs confirming its destruction.

    While not confirmed, it looks like a ransom payment was made. A webinar on May 13 may provide more details. instructure.com/incident_update #Breach #Hackers #ShinyHunters #Infrastructure #CanvasLMS #LMS #StudentData #DataPrivacy #Ransom #RansomWare #CyberCrime

  9. "Agreement:" reached in ShinyHunter's breach of Infrastructure's Canvas LMS .... the cybercrime gang returned the stolen data (which includes usernames, email addresses, course names, enrollment information, and messages) and provided shred logs confirming its destruction.

    While not confirmed, it looks like a ransom payment was made. A webinar on May 13 may provide more details. instructure.com/incident_update #Breach #Hackers #ShinyHunters #Infrastructure #CanvasLMS #LMS #StudentData #DataPrivacy #Ransom #RansomWare #CyberCrime

  10. "Agreement:" reached in ShinyHunter's breach of Infrastructure's Canvas LMS .... the cybercrime gang returned the stolen data (which includes usernames, email addresses, course names, enrollment information, and messages) and provided shred logs confirming its destruction.

    While not confirmed, it looks like a ransom payment was made. A webinar on May 13 may provide more details. instructure.com/incident_update

  11. #Canvas #Breach Disrupts #Schools & #Colleges Nationwide

    An ongoing data #extortion #attack targeting the widely-used #education technology platform Canvas disrupted classes and #coursework at #school districts and #universities across the United States today, after a #cybercrime group defaced the serviceโ€™s login page with a #ransom demand that threatened to #leak data from 275 million #students & faculty across nearly 9,000 educational institutions.
    #privacy #security

    krebsonsecurity.com/2026/05/ca

  12. #Canvas #Breach Disrupts #Schools & #Colleges Nationwide

    An ongoing data #extortion #attack targeting the widely-used #education technology platform Canvas disrupted classes and #coursework at #school districts and #universities across the United States today, after a #cybercrime group defaced the serviceโ€™s login page with a #ransom demand that threatened to #leak data from 275 million #students & faculty across nearly 9,000 educational institutions.
    #privacy #security

    krebsonsecurity.com/2026/05/ca

  13. #Canvas #Breach Disrupts #Schools & #Colleges Nationwide

    An ongoing data #extortion #attack targeting the widely-used #education technology platform Canvas disrupted classes and #coursework at #school districts and #universities across the United States today, after a #cybercrime group defaced the serviceโ€™s login page with a #ransom demand that threatened to #leak data from 275 million #students & faculty across nearly 9,000 educational institutions.
    #privacy #security

    krebsonsecurity.com/2026/05/ca

  14. Disrupts & Nationwide

    An ongoing data targeting the widely-used technology platform Canvas disrupted classes and at districts and across the United States today, after a group defaced the serviceโ€™s login page with a demand that threatened to data from 275 million & faculty across nearly 9,000 educational institutions.

    krebsonsecurity.com/2026/05/ca

  15. #Canvas #Breach Disrupts #Schools & #Colleges Nationwide

    An ongoing data #extortion #attack targeting the widely-used #education technology platform Canvas disrupted classes and #coursework at #school districts and #universities across the United States today, after a #cybercrime group defaced the serviceโ€™s login page with a #ransom demand that threatened to #leak data from 275 million #students & faculty across nearly 9,000 educational institutions.
    #privacy #security

    krebsonsecurity.com/2026/05/ca

  16. NEW: A Silent Threat, Loud Consequences: Ransom Group Hits Law Firms Hard

    #SilentRansomGroup has leaked data from 38 law firms so far -- and they tell me most law firms do pay them. That means.... (counting on fingers and toes...) they've hit a heckuva lot of law firms.

    And I'm beginning to get a feel for how their negotiations go when they fail.

    Read about their attack on Wood Smith Henning & Berman at:

    databreaches.net/2026/04/13/a-

    #hackandleak #ransom #cybersec #infosec #databreach

  17. Cyber sleuths uncover nefarious techniques to take malware (dubbed Omnistealer) posted in GitHub and use social engineering techniques to get it embedded into blockchains where the malware may be stored forever and make it difficult to root out as the chains grow.

    "Hiding malicious payloads within blockchain has become an emerging obfuscation technique."

    Omnistealer is capable of stealing cryptocurrency, passwords and privileged credentials for accessing an organization's information. pcmag.com/news/malware-is-slee #CyberSecurity #Ransom-ISAC #Security #CyberAttack #Malware #BlockChain #GitHub #FakeJobs #FakeRecruiters #JobInterviews #OmniStealer #Cyber #SocialEngineering

  18. Cyber sleuths uncover nefarious techniques to take malware (dubbed Omnistealer) posted in GitHub and use social engineering techniques to get it embedded into blockchains where the malware may be stored forever and make it difficult to root out as the chains grow.

    "Hiding malicious payloads within blockchain has become an emerging obfuscation technique."

    Omnistealer is capable of stealing cryptocurrency, passwords and privileged credentials for accessing an organization's information. pcmag.com/news/malware-is-slee #CyberSecurity #Ransom-ISAC #Security #CyberAttack #Malware #BlockChain #GitHub #FakeJobs #FakeRecruiters #JobInterviews #OmniStealer #Cyber #SocialEngineering

  19. Cyber sleuths uncover nefarious techniques to take malware (dubbed Omnistealer) posted in GitHub and use social engineering techniques to get it embedded into blockchains where the malware may be stored forever and make it difficult to root out as the chains grow.

    "Hiding malicious payloads within blockchain has become an emerging obfuscation technique."

    Omnistealer is capable of stealing cryptocurrency, passwords and privileged credentials for accessing an organization's information. pcmag.com/news/malware-is-slee #CyberSecurity #Ransom-ISAC #Security #CyberAttack #Malware #BlockChain #GitHub #FakeJobs #FakeRecruiters #JobInterviews #OmniStealer #Cyber #SocialEngineering

  20. Cyber sleuths uncover nefarious techniques to take malware (dubbed Omnistealer) posted in GitHub and use social engineering techniques to get it embedded into blockchains where the malware may be stored forever and make it difficult to root out as the chains grow.

    "Hiding malicious payloads within blockchain has become an emerging obfuscation technique."

    Omnistealer is capable of stealing cryptocurrency, passwords and privileged credentials for accessing an organization's information. pcmag.com/news/malware-is-slee #CyberSecurity #Ransom-ISAC #Security #CyberAttack #Malware #BlockChain #GitHub #FakeJobs #FakeRecruiters #JobInterviews #OmniStealer #Cyber #SocialEngineering

  21. Cyber sleuths uncover nefarious techniques to take malware (dubbed Omnistealer) posted in GitHub and use social engineering techniques to get it embedded into blockchains where the malware may be stored forever and make it difficult to root out as the chains grow.

    "Hiding malicious payloads within blockchain has become an emerging obfuscation technique."

    Omnistealer is capable of stealing cryptocurrency, passwords and privileged credentials for accessing an organization's information. pcmag.com/news/malware-is-slee -ISAC

  22. Nancy Guthrieโ€™s kidnapping is latest abduction case to capture Americaโ€™s attention

    TUCSON, Ariz. (AP) โ€” Authorities have not identified any suspects or persons of interest in a desperate, five-dayโ€ฆ
    #NewsBeep #News #US #USA #UnitedStates #UnitedStatesOfAmerica #BreakingNews #abductions #arizona #Cleveland #dejesus #elizabeth #Guthrie #Headlines #knight #Michelle #nancy #ransom #Savannah #sinatra #smart #Topstories #TopStories #tucson
    newsbeep.com/us/452482/

  23. Nancy Guthrieโ€™s kidnapping is latest abduction case to capture Americaโ€™s attention

    TUCSON, Ariz. (AP) โ€” Authorities have not identified any suspects or persons of interest in a desperate, five-dayโ€ฆ
    #NewsBeep #News #US #USA #UnitedStates #UnitedStatesOfAmerica #BreakingNews #abductions #arizona #Cleveland #dejesus #elizabeth #Guthrie #Headlines #knight #Michelle #nancy #ransom #Savannah #sinatra #smart #Topstories #TopStories #tucson
    newsbeep.com/us/452482/

  24. There's a courier service here that handles last-mile delivery of most of my orders from AliExpress (so, a lot of packages).

    Every time a package from their international courier finishes clearing customs and is then handed over to this last-mile courier, I get an automated email with the subject "We have your package!".

    It always makes me think they're holding it for ransom or something ๐Ÿ˜†

    #package #courier #note #demand #ransom

  25. ๐€ctrice ๐๐ฎ ๐‰our

    ๐‘๐ž๐ง๐ž ๐‘๐ฎ๐ฌ๐ฌ๐จ
    Actrice Productrice Amรฉricaine Nรฉe en 1954

    #ReneRusso c'est prรฉs de 30 Films

    #ActriceDuJour #actress #actrice #cinegenres #film #cinema
    #Freejack #InTheLineOfFire #Outbreak #GetShorty #Ransom #LethalWeapon
    #Showtime #NightCall #Nightcrawler #Avengers

    ๐„n ๐’avoir ๐lus:
    instagram.com/cinegenres/

  26. Alleged Scattered Spider members Thalha Jubair and Owen Flowers who are both charged with the TransportForLondon cyberattack, pleaded not guilty in Southwark Crown Court in London today. The judge has set a trial date of June 8, 2026 for them, and they continue to be detained on remand.

    Flowers is also charged with conspiring to damage the network of SSM Health Care Corporation and attempting to do the same to Sutter Health, both U.S. healthcare entities. He pleaded not guilty to those charges, too.

    Jubair also faces an additional charge of not providing his password to investigators when they seized his devices.

    #ScatteredSpider #databreach #ransom #cybersecurity

  27. NEW by me:

    From bad to worse: Doctor Alliance hacked again by same threat actor

    databreaches.net/2025/11/18/fr

    This is a bad #databreach in terms of the #PII and #PHI acquired by the hacker, "Kazu," who is about to leak it all.
    Oof.

    Background: I reported on the first breach/attack a few days ago at databreaches.net/2025/11/12/do

    When the CEO claimed it was all secured the same day, the hacker got ticked off and went back in and hacked them again.

    #HealthSec #HIPAA #BusinessAssociate #thirdparty #vendor #hack #ransom #cybersecurity #incidentresponse

    @zackwhittaker @campuscodi @euroinfosec @Hackread

  28. #JustWatched #FilmMastodon ๐ŸŽฅ ๐ŸŽฌ
    #Highest2Lowest (2025)
    When a titan music mogul is targeted with a ransom plot, he is jammed up in a life-or-death moral dilemma.
    #DenzelWashington #JeffreyWright #ASAPRocky

    3/5 โญ๏ธ - OK, but not as good as Mel Gibson's #Ransom (1996)

  29. #JustWatched #FilmMastodon ๐ŸŽฅ ๐ŸŽฌ
    #Highest2Lowest (2025)
    When a titan music mogul is targeted with a ransom plot, he is jammed up in a life-or-death moral dilemma.
    #DenzelWashington #JeffreyWright #ASAPRocky

    3/5 โญ๏ธ - OK, but not as good as Mel Gibson's #Ransom (1996)

  30. #JustWatched #FilmMastodon ๐ŸŽฅ ๐ŸŽฌ
    #Highest2Lowest (2025)
    When a titan music mogul is targeted with a ransom plot, he is jammed up in a life-or-death moral dilemma.
    #DenzelWashington #JeffreyWright #ASAPRocky

    3/5 โญ๏ธ - OK, but not as good as Mel Gibson's #Ransom (1996)