The hacking group goes by many names including Sofacy and Pawn Storm.
A man linked to the iCloud photo hack claimed to simply be a middleman.
The ransomware was detected as being distributed via the Kelihos botnet and is demanding $320 as ransom.
The hackers have leaked around 20 internal files as retaliation for the bank's CEO not accepting their 'handsome proposal'.
Google's Project Shield came to the rescue after site battled a 'historically large' two-week-long cyberattack.
Kosovo citizen Ardit Ferizi, who went by the name Th3Dir3ctorY, was sentenced for providing the stolen data to Isis.
Cybersecurity experts say evidence needed to back up nation-state claims.
IoT devices become prime targets for hackers due to lax security, say security researchers
Security researchers allegedly intercepted configuration files being used by hackers in the attacks.
Investigators have not yet ruled out the possibility of the Shadow Brokers being affiliated with Russia.
Yahoo is currently notifying all impacted users abut the landmark breach.
Millions of accounts were uploaded to the Dark Web by a hacker called Peace.
Researchers have uncovered that the malware is distributed via spam email campaigns.
It is not clear whether specific people were targeted by crooks or if the incidents were random.
Kremlin-linked hackers have been accused of hacking a slew of US political groups.
The site's vulnerability has since been patched and is no longer believed to be compromised.
The latest version of the Trojan prompts users into unknowingly providing system admin access and steals credentials.
The hacker also said that he accessed the voter registration database.
Cisco has not issued a software update yet adding that there are currently 'no workarounds that address this vulnerability'.
Martin Gottesfeld, 31, is facing years in prison for alleged role in cyberattacks.
The radio host is said to be 'very stressed' at the situation.
Microsoft is aware of the issue but is currently not acting on it as it does not consider this to be a 'valid vulnerability'.