
Fog ransomware publishes victim’s IP-addresses
Cybercriminals behind the Fog ransomware publish leaked data along with the IP addresses of attacked computers.
1237 articles
Cybercriminals behind the Fog ransomware publish leaked data along with the IP addresses of attacked computers.
How to respond to a compromised GitHub changed-files Action incident.
Reasons for updating your ESXi infrastructure ASAP, and enterprise threats that VM escape poses.
Microsoft’s March Patch Tuesday fixes several vulnerabilities that have already been used in the wild. Details are not clear at the moment, but it’s worth installing the patches ASAP.
We’ve added technology that checks QR codes in emails for phishing links.
What information does an MDR service need to protect a company from complex targeted attacks?
A vulnerability in Google OAuth allows attackers to access accounts of defunct organizations through abandoned domains.
A step-by-step guide to scanning disk arrays weighing tens of terabytes with the aid of Kaspersky products.
A year after the ransomware attack on healthcare giant UnitedHealth Group, we’ve compiled all publicly available information about the incident and its aftermath.
Just a few hours before 2025, we recorded a surge in cryptominer distribution through video games. Interestingly, not only home PCs but also corporate machines were affected.
New research demonstrates for the first time how hardware vulnerabilities in modern CPUs can be exploited in practice.
$3 billion worth of damage to healthcare insurance giant, schools closed, soccer club players’ data leaked, and other ransomware incidents in 2024.
What network-security and access-control tools do the world’s top cyber-regulators recommend to companies?
Researchers have discovered a vulnerability in the 7-Zip file archiver software.
The complete story of the hype, panic, and misunderstanding surrounding attacks on cryptographic algorithms using quantum computers.
Attacks on companies via their suppliers and contractors are becoming increasingly widespread. How can you manage this risk?
How to estimate what and how much hardware will be needed for a SIEM system to assess the costs before deployment?
Kaspersky specialists, in collaboration with external experts, have formulated some key guidelines for safe and legal use of AI.
Cybercriminals distributing the Mamont banker under the guise of an application for tracking the delivery of goods at wholesale prices.