Create an account or login for free to unlock our expert analysis and key takeaways for this development.
By continuing, you agree to receive marketing communications and our weekly newsletter. You can opt-out at any time.

A late‑May 2025 intrusion into ApolloMD’s systems led to the unauthorized access and copying of personally identifiable and clinical information for about 626,540 people, with some files containing Social Security numbers; the incident was later posted to a ransomware-linked leak site. ApolloMD reported the event to federal health authorities, began mailing breach notifications by September 2025 and is offering affected parties complimentary credit monitoring, highlighting broader third‑party risk in health data aggregation.

Japan’s chip-test equipment maker reported an IT intrusion on Feb. 15 and says investigators found signs of ransomware on parts of its network. The company has not confirmed data theft and is evaluating impacts for customers and employees while response teams continue containment work.
Enterprise ransomware playbooks commonly treat credential resets as a human-only control, leaving service accounts, API keys, tokens and certificates intact — a blind spot that accelerates lateral movement and drives recovery costs. Market shifts toward targeted, disruption-focused extortion and faster weaponization via agentic AI make that omission more dangerous: defenders must pair machine-identity governance with identity-first detection and quicker containment to blunt modern ransomware economics.
A researcher found a publicly accessible collection of roughly 149 million stolen logins harvested by credential-stealing malware, including hundreds of thousands tied to major crypto platforms and numerous government-related accounts. The exposure stems from infected end-user devices rather than platform breaches, but it raises urgent questions about account hygiene, phishing risk, and detection across the crypto and social-media ecosystems.

Federal agents have taken control of RAMP’s online domains, disrupting a multilingual marketplace that facilitated ransomware and related criminal services. The move removes a central storefront but leaves tooling, relationships, and likely migration paths intact, while providing intelligence opportunities for follow-on prosecutions.
Mass data-theft campaigns have lost their profit edge as corporate resistance to paying ransoms grows, prompting ransomware operators to favor encryption and more disruptive tactics. High-profile law-enforcement seizures of prominent forums (e.g., RAMP) are adding friction for criminals but also driving them into more private, invitation-only channels.

ShinyHunters published a large archive of customer contact data it says was taken from Panera Bread after a failed extortion attempt, claiming about 5.1 million unique email addresses within an asserted 14 million-record haul. Researchers say the Panera intrusion matches a wider, telephone-based social-engineering trend—real-time vishing paired with browser phishing toolkits—and a separate unsecured infostealer cache of roughly 149 million credentials that together amplify risks of credential stuffing and targeted account takeover.
A prolonged intrusion into Conduent’s systems has revealed personal and medical records tied to Volvo Group employees, with roughly 17,000 staff impacted and broader consumer exposure measured in the millions. State filings show the scope has swollen well beyond initial estimates, forcing a complex third‑party remediation and regulatory reporting challenge for affected companies.