216 articles
Time to update Fortra GoAnywhere MFT: an exploit has been developed for a critical vulnerability that allows attackers to bypass authentication and create admin accounts.
Even if you don’t know it, you probably have devices running Linux at home — and they need protection too! Here are three Linux threats that even IT professionals often forget about.
Now anyone can sign device firmware with MSI private keys. This represents a long-term persistent risk to be considered by all users.
Crypto mixers, nested exchanges, cash-out and other crypto-laundering methods used by ransomware operators.
Linux and ESXi-based systems are increasingly falling victim to ransomware attacks. So how can you protect your servers?
Kaspersky experts discover a CLFS vulnerability being exploited by cybercriminals.
Information security measures are far more effective when supported by top management. How to get this support?
Security evolution: The large-scale, but short-lived ransomware epidemic of 2017.
The Andariel group attacks companies with several malicious tools.
The new Luna and Black Basta ransomware strains are capable of attacking Windows, Linux and VMware ESXi.
Five arguments in favor of installing security solutions on the endpoints of a small company.
Deep analysis of modern ransomware allows you to implement universal methods to counter them.
For Anti-Ransomware Day, we decided to publish few tips that will help your company avoid falling victim to ransomware for a second time.
Our cryptanalysts have found a way to decrypt files encrypted by Yanluowang.
Our experts investigated the activity and studied tools of ransomware gang BlackCat.
HermeticRansom cryptor was used as a distraction to support HermeticWiper attacks.