The history of eSurv is a vivid example of how the business of selling spyware can go "on a curve".
In 2019, SecurityLab reported on the Italian spyware manufacturer eSurv, which infected at least 1 thousand Google Play users with malicious applications. Although the company sold its products...
Ethereum appears to be hastening its transition to Proof-of-Stake, with developer Mikhail Kalinin publishing the specifications for the chain merge with Eth2.
Ethereum’s developers appear to be hastening the network’s shift toward Proof-of-Stake consensus and away from the Proof-of-Work mining...
Traders are racing to speculate on Bitcoin in the derivatives markets, with open interest in BTC futures approaching $20 billion for the first time.
With BTC again edging toward all-time highs, a large volume of money is flowing into the Bitcoin derivatives markets.
According to crypto market...
The Elasticsearch server, which contains about 2 billion user records, was not password-protected.
An unsecured database of the Ringostat phone call tracking service, whose services are used by customers around the world, mainly in Ukraine and the Russian Federation, was discovered on the...
The decision was made in connection with numerous attacks on MSP in recent years.
NinjaRMM, a company that provides endpoint management software to managed service providers (MSPs), intends to create its own "red Team" of specialists (Red Team) to improve cybersecurity. The decision was made in...
The updated Unc0ver 6.0.0 jailbreak utility for iPhone supports hacking from iOS 11 to iOS 14.3, iOS 14.4 does not.
The team of hackers of the Apple mobile platform with the experience of Unc0ver has released a jailbreak that works on iOS from version 14 to 14.3 with support for all iPhone...
The FriarFox extension gives hackers full access to the victim's Gmail and access to her data for all sites.
Specialists of the information security company Proofpoint told about a Chinese cybercrime group that hacks Gmail accounts using a browser extension.
The cybercrime group TA413 has been...
Washington said it would apply not only sanctions to Russia, but also "visible and invisible tools."
The US threatens Russia to respond to an attack by alleged Russian hackers of the US government. Joe Biden's national security adviser, Jake Sullivan, promised that he would make sure that...
Over the past couple of months, the volume of phishing attacks using distorted URL prefixes has increased by 5933%.
Security researchers at GreatHorn have discovered a new phishing campaign in which criminals bypass traditional URL protection.
While many phishing scams involve changing the...
Around $500 million worth of positions were liquidated within hours as the Tesla news caused Bitcoin to spike over $46,000.
Bitcoin (BTC) has extended its rally over $46,000 on Feb. 9, a day after a U.S. Securities and Exchange Commission (SEC) filing revealed that Tesla bought $1.5 billion...
The criminals have published a list of organizations that they do not intend to attack, including hospitals, schools, small businesses, etc.
The operators of the ransomware Babyk (also known as Babuk) have created their own data leak site to publish the stolen data of victims as part of a...
In the last 30 days, FTX Token rallied 105% as its exchange surpassed BitMEX and Deribit's open interest, but is there room for further upside?
FTX is a cryptocurrency derivatives exchange backed by Alameda Research, a quantitative trading firm and crypto liquidity provider.
The exchange...
In another publication, a representative of the group shared a link to the RAR archive with the name "Fonix_decrypter.rar", containing both the decryptor and the decryption master private key.
The decryptor is an administrator tool used within the ransomware group. Sometimes ransomware allows...
Scammers send out emails to consumers with links to the websites of real companies in order to build trust.
British consumers lost 78 million pounds ($109 million) to so-called "clone firms" last year, as financial problems linked to the pandemic convinced many to make rash investments. As...
On the site Perl.com there was a notification about the sale of this domain, also containing the contact details of the registrar.
Perl programming language specialist Brian Fay, reported that control over the domain Perl.com it was intercepted by unknown cybercriminals.
"We're still trying to...
Experts have recorded 550 reports of double extortion on the sites of data leaks of various extortionate groups.
In 2020, ransomware operators resorted to a double-extortion strategy, in which attackers steal victims ' unencrypted files and then threaten to publish them if a ransom is not paid...
A further commitment to its treasury sees MicroStrategy join Grayscale as this week's big buyer while others keep selling.
Bitcoin (BTC) showed signs of a resurgence on Jan. 22 after a trip below $30,000 produced fresh buyer support.
BTC price seals 8.5% daily bounce
Data from Cointelegraph...
He faces up to 10 years in prison and an obligation to pay a fine of up to $ 250,000.
The Russian agreed to a prison sentence of up to 10 years, as well as the need to pay a fine of up to 250 thousand dollars (more than 18.5 million rubles). Now this agreement with the investigation will soon...
iFinex Inc needs another 30 days to produce trial documents for the New York Attorney General.
iFinex Inc — the parent company of crypto exchange Bitfinex and stablecoin issuer Tether (USDT) — has written to the New York Supreme Court requesting that its upcoming trial date be pushed back even...
Operation Enemies of the People began after the US presidential election and resumed during the storming of the Capitol.
The FBI reported on a malicious cyber operation called Enemies of the People ("Enemies of the People"), conducted by Iranian hackers against the US federal government, state...