LockBit 5.0 ransomware group has attacked VILATI Gyártó Zrt., a Hungarian sheet metal manufacturer. Sensitive data is at risk as threats of data leakage loom.
Ransomware Attacks, Data Breaches, and Threat Intelligence – All in One Stream.
Ransomware Attacks, Data Breaches, and Threat Intelligence – All in One Stream.
LockBit 5.0 ransomware group has attacked VILATI Gyártó Zrt., a Hungarian sheet metal manufacturer. Sensitive data is at risk as threats of data leakage loom.
Union Trading Company W.L.L., a prominent retailer in Kuwait, has fallen victim to a ransomware attack by LockBit 5.0. The threat actors have threatened to leak sensitive data unless their demands are met.
Meng Seng Plastic Co., Ltd., a leading Malaysian plastic packaging manufacturer, has fallen victim to a ransomware attack by LockBit 5.0. This incident raises cybersecurity concerns in the manufacturing sector.
Max USA Corp. has fallen victim to a ransomware attack by LockBit 5.0, a notorious cybercriminal group. The attack has compromised sensitive company data, with threats to leak information unless demands are met.
Transportes La Sevillanita Srl, an Argentine logistics company, has been targeted by the ransomware group LockBit 5.0. The attack threatens to leak sensitive data if demands are not met.
A ransomware attack by LockBit 5.0 has impacted Dynamic Machining & Manufacturing (DM²), a key player in the U.S. manufacturing sector. The threat actors have threatened to leak sensitive data unless negotiations are initiated.
LockBit 5 ransomware group has reportedly attacked Yunan County Qingyuan Water Supply Co., Ltd in China. The threat actors have allegedly accessed sensitive data and posted an extortion notice.
Jiangsu Zhidi Digital Technology Co., Ltd., known as Changzhou Kingdee, has fallen victim to a ransomware attack by LockBit 5.0, jeopardizing sensitive company data.
LockBit 5.0 has targeted Hum’s Hardware & Rental in a recent ransomware attack, threatening the release of sensitive data. The Argentina-based company is now dealing with the aftermath and potential data exposure.