Monday, January 12, 2026

Firewall Challenge Week 3 – DEV Community

Keep Your Ubuntu-based VPN Server Up to Date

Enterprise-Grade Security for Small Businesses with Linux and Open Source

Ethics for Ephemeral Signals – A Manifesto

When Regex Falls Short – Auditing Discord Bots with AI Reasoning Models

Cisco Live 2025: Bridging the Gap in the Digital Workplace to Achieve ‘Distance Zero’

Agentforce London: Salesforce Reports 78% of UK Companies Embrace Agentic AI

WhatsApp Aims to Collaborate with Apple on Legal Challenge Against Home Office Encryption Directives

AI and the Creative Industries: A Misguided Decision by the UK Government

Criminal Gang Dealt Blow as FBI Discovers 7,000 LockBit Decryption Keys

The FBI has obtained thousands of LockBit ransomware decryption keys and is offering to help victims of the cyber criminal gang that was caught in a UK-led sting in February 2024. Bryan Vorndran, assistant director of the FBI Cyber Division, announced this at a cyber security conference in Boston, Massachusetts on June 5th. American victims are encouraged to contact the FBI to reclaim their data, while victims in other countries should reach out to their national cyber authorities.

LockBit ransomware was created by Dimitri Khoroshev, known online as LockBitsupp, Nerowolfe, and Putinkrab. The ransomware-as-a-service (RaaS) actors behind LockBit conducted over 2,400 cyber attacks and extorted billions of dollars from victims before the operation was disrupted in February. Since then, authorities have been using Khoroshev’s own tactics against him, exposing his criminal activities and refusing to show leniency.

Raj Samani, senior vice-president and chief scientist at Rapid7, praised the FBI’s release of over 7,000 LockBit decryption keys as a blow to the ransomware group. Khoroshev has been sanctioned by US authorities and faces charges related to fraud, computer damage, and extortion. While some LockBit members have been arrested, Khoroshev’s potential conviction is unlikely due to Russia’s protection of cyber criminals.

Despite the successful takedown of LockBit’s infrastructure, affiliates of the group are still carrying out cyber attacks. Recent victims include a hospital in France, a university in Italy, and a pharmacy chain in Canada. The distribution of LockBit 3.0 through phishing emails orchestrated by the Phorpiex botnet suggests that the threat of LockBit attacks remains, even after the disruption caused by law enforcement.