June 7, 2023, 2:33 p.m. | Zeljka Zorz

Help Net Security www.helpnetsecurity.com

A number of ransomware gangs have stopped using malware to encrypt targets’ files and have switched to a data theft/extortion approach to get paid; 0mega – a low-profile and seemingly not very active threat actor – seems to be among them. About the 0mega ransomware operation 0mega (spelled with a zero) is a relative newcomer to the ransomware/extortion business. Evidence of its activities were first spotted roughly a year ago, when one victim – a … More


The post …

0mega 0mega ransomware account hijacking actor data data theft don't miss encrypt extortion files gangs hot stuff low malware obsidian security paid profile ransomware ransomware gang ransomware gangs relative saas tactics theft threat threat actor

Director, Cyber Risk

@ Kroll | South Africa

Security Engineer, XRM

@ Meta | New York City

Security Analyst 3

@ Oracle | Romania

Internship - Cyber Security Operations

@ SES | Betzdorf, LU

Principal Product Manager (Network/Security Management) - NetSec

@ Palo Alto Networks | Bengaluru, India

IT Security Engineer

@ Timocom GmbH | Erkrath, Germany