Cybercriminals are increasingly using a precise, targeted approach called ‘whaling’ to gain sensitive information or exploit high-profile individuals within businesses. The practice is similar to spear-phishing, relying on impersonation and social engineering tactics to deceive victims into revealing confidential information or performing unauthorised transactions. Measures such as employee education, multi-factor authentication, and robust security protocols can help protect against these attacks.

Decrypting Linux/ESXi Akira Ransomware Files Without Paying Ransomware
A cybersecurity researcher has decrypted the Linux/ESXI variant of Akira ransomware, allowing data recovery without ransom. The method exploits a flaw in the malware’s encryption