IT Security News
Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel
EN, Security

BHI Energy Releases Details of Akira Ransomware Attack

2023-10-26 00:10
The threat actor exfiltrated 690 gigabytes of uncompressed data, or 767,035 files.

This article has been indexed from Dark Reading

Read the original article:

BHI Energy Releases Details of Akira Ransomware Attack

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on X (Opens in new window) X
  • Share on LinkedIn (Opens in new window) LinkedIn

Like this:

Like Loading...

Related

Post navigation

← IT Sicherheitsnews taegliche Zusammenfassung 2023-10-25
Stronger Together: Attack Surface Management and Security Validation →

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel

Recent Posts

  • The Self-Healing Endpoint: Why Automation Alone No Longer Cuts It March 27, 2026
  • Iran-Linked Threat Group Hacks FBI Director Kash Patel’s Personal Email March 27, 2026
  • TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files March 27, 2026
  • Pro-Iranian Hacking Group Claims Credit for Hack of FBI Director Kash Patel’s Personal Account March 27, 2026
  • What Is CIAM? A Complete Guide to Customer Identity and Access Management in 2026 March 27, 2026
  • Apple’s Email Privacy Tool Tested in FBI Threat Case, Exposing Limits of Anonymity March 27, 2026
  • IT Security News Hourly Summary 2026-03-27 18h : 9 posts March 27, 2026
  • Espionage campaign targets telecom with stealthy Linux-based backdoor March 27, 2026
  • BianLian Ransomware Spreads via Fake Invoice SVG Images in New Attacks March 27, 2026
  • AI Upgrades, Security Breaches, and Industry Shifts Define This Week in Tech March 27, 2026
  • Critical Vulnerabilities, Insider Threats, and AI-Driven Cybercrime Define the Week March 27, 2026
  • RSAC 2026: How Zscaler Is Securing the AI Ecosystem March 27, 2026
  • Iranian hackers claim breach of FBI director Kash Patel’s personal email account March 27, 2026
  • CISA and BSI warn orgs of critical PTC Windchill and FlexPLM flaw March 27, 2026
  • New AITM phishing wave hijacks TikTok Business accounts March 27, 2026
  • New Wave of AiTM Phishing Targets TikTok for Business March 27, 2026
  • New Silver Fox Campaign Hits Japanese Businesses With Tax-Themed Phishing Lures March 27, 2026
  • AO-labs March 27, 2026
  • Nvidia DLSS 5 Sparks Backlash as AI Graphics Divide Gaming Industry March 27, 2026
  • Govt, RBI Tighten Grip on Fraudulent Loan Apps March 27, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}
%d