VECT 2.0 was built to lock your files and demand a ransom. A rookie coding mistake means it's just destroying them instead.
Ransomware attacks are increasingly threatening to K–12 schools, with districts of all sizes becoming prime targets for ...
Check Point researchers have uncovered a new ransomware-as-a-service threat with significant design flaws. Vect 2.0 is unable ...
A new disclosed cPanel flaw tracked as CVE-2026-41940 is being mass-exploited to breach websites and encrypt data in "Sorry" ...
Threat hunters are warning that the cybercriminal operation known as VECT 2.0 acts more like a wiper than a ransomware due to ...
This might be the work of an amateur, but they might not stay an amateur for long.
Researchers are warning that the VECT 2.0 ransomware has a problem in the way it handles encryption nonces that leads to ...
New capability indexes ransomware leak-site file trees into Cerberus platform, accelerating incident response even when organizations aren’t the primary victim. This feature allows analysts to quickly ...
External cyber risk management tools company Searchlight Cyber Ltd. today announced the release of Ransomware File Explorer, a new capability within its Cerberus investigation platform that provides ...
Ransomware attacks turn important files into encrypted gibberish. Paying to get them back may seem like your only option, but the best ransomware protection we've tested can prevent those attacks from ...
The notorious CLOP ransomware gang is claiming responsibility for exploiting a zero-day vulnerability in Cleo’s file-transfer services to steal data from numerous companies. The gang told ...