Top Categories

Spotlight

todayMarch 23, 2025

Ransomware endpointsecurity

Fog ransomware publishes victim’s IP-addresses

Cybercriminals behind the Fog ransomware publish leaked data along with the IP addresses of attacked computers. Recently, experts from Kaspersky’s Global Research and Analysis Team (GReAT) noted that, after attacks with Fog ransomware, malefactors were publishing not only victim’s data, but also the IP addresses of the attacked computers. We [...]


Blog

5 Results / Page 1 of 1

Background

todayMarch 23, 2025

  • 66
  • 95
close

Ransomware endpointsecurity

Fog ransomware publishes victim’s IP-addresses

Cybercriminals behind the Fog ransomware publish leaked data along with the IP addresses of attacked computers. Recently, experts from Kaspersky’s Global Research and Analysis Team (GReAT) noted that, after attacks with Fog ransomware, malefactors were publishing not only victim’s data, but also the IP addresses of the attacked computers. We ...

todayMarch 13, 2025

  • 199
  • 198
close

Cyber security endpointsecurity

Three VMware vulnerabilities: key risks and urgent patches

Reasons for updating your ESXi infrastructure ASAP, and enterprise threats that VM escape poses. On March 4, Broadcom released emergency updates to address three vulnerabilities — CVE-2025-22224, CVE-2025-22225 and CVE-2025-22226 — that affect several VMware products, including ESXi, Workstation, and Fusion. A note in the Broadcom advisory stated that at ...

todayMarch 10, 2025

  • 81
  • 171
close

Cyber security + Cybercrime endpointsecurity

Checking QR codes in emails

In an attempt to bypass security solutions, attackers are increasingly hiding phishing and other malicious links inside QR codes. It’s for this reason that Kaspersky has added a technology to Kaspersky Secure Mail Gateway that reads QR codes (including ones hidden inside PDF files), extracts links and checks them before ...

todayFebruary 28, 2025

  • 77
  • 141
close

Cyber security + Global news endpointsecurity

Attack on Google OAuth using abandoned domains

Just over a year ago, in our post entitled Google OAuth and phantom accounts, we discussed how using the “Sign in with Google” option for corporate services allows employees to create phantom Google accounts that aren’t controlled by the corporate Google Workspace admin, and continue to function after offboarding. Recently, ...


LOGO

  • help@firwl.com
  • info@firwl.com


Products


Company


Contacts

Support