
Fog ransomware publishes victim’s IP-addresses
Cybercriminals behind the Fog ransomware publish leaked data along with the IP addresses of attacked computers.
222 articles
Cybercriminals behind the Fog ransomware publish leaked data along with the IP addresses of attacked computers.
Reasons for updating your ESXi infrastructure ASAP, and enterprise threats that VM escape poses.
Microsoft’s March Patch Tuesday fixes several vulnerabilities that have already been used in the wild. Details are not clear at the moment, but it’s worth installing the patches ASAP.
A year after the ransomware attack on healthcare giant UnitedHealth Group, we’ve compiled all publicly available information about the incident and its aftermath.
$3 billion worth of damage to healthcare insurance giant, schools closed, soccer club players’ data leaked, and other ransomware incidents in 2024.
Our experts have discovered ransomware they’ve dubbed “ShrinkLocker”, which encrypts infected computers’ drives using BitLocker — a utility built into Windows.
Time to update Fortra GoAnywhere MFT: an exploit has been developed for a critical vulnerability that allows attackers to bypass authentication and create admin accounts.
Even if you don’t know it, you probably have devices running Linux at home — and they need protection too! Here are three Linux threats that even IT professionals often forget about.
Now anyone can sign device firmware with MSI private keys. This represents a long-term persistent risk to be considered by all users.
Crypto mixers, nested exchanges, cash-out and other crypto-laundering methods used by ransomware operators.
Linux and ESXi-based systems are increasingly falling victim to ransomware attacks. So how can you protect your servers?
Kaspersky experts discover a CLFS vulnerability being exploited by cybercriminals.
Information security measures are far more effective when supported by top management. How to get this support?
Security evolution: The large-scale, but short-lived ransomware epidemic of 2017.
The Andariel group attacks companies with several malicious tools.
The new Luna and Black Basta ransomware strains are capable of attacking Windows, Linux and VMware ESXi.
Five arguments in favor of installing security solutions on the endpoints of a small company.