A cybersecurity researcher has decrypted the Linux/ESXI variant of Akira ransomware, allowing data recovery without ransom. The method exploits a flaw in the malware’s encryption that uses nanosecond timestamps as seeds. A CUDA-optimized brute-force tool achieved up to 2.3 billion attempts per second. The researcher has published the code and methodology on GitHub for affected organizations.

Phishing Campaign Impersonates Booking.com, Plants Malware
Cybersecurity professionals have raised concerns over a new phishing campaign that imitates Booking.com to plant credential-stealing malware. The threat, first detected in December 2024, targets