Security researchers have reported an increase in cyber attacks using Google services as a weapon to circumvent security measures and steal credentials, credit card data and other personal information.
A team of experts from Armorblox analyzed five phishing campaigns, which they call the "tip...
The Ministry of Finance proposes amendments with fines or jail for hiding cryptocurrencies when submitting declarations.
The Russian Ministry of Finance prepared amendments to the Tax, Criminal and Criminal Procedure Codes and the Code of Administrative Offenses. According to them, those owners...
The American Corporation Twitter Inc has hired one of the hackers Payter Zatko, previously known by the network alias Mudge, as the head of the security service.
Zatko will report directly to CEO Jack Dorsey. It is planned that it will take over the management of key security functions. In an...
Fraudsters in the USA have succeeded in using Apple Pay and stolen credit card data to purchase goods worth over 1.5 million US dollars. The leader of the fraud ring, a 30-year-old from Miami, has now been sentenced by a court to four and a half years in prison for wire fraud and identity theft...
Bleeping Computer reports that over the weekend, a hacker forum put up for sale a database of the popular 123rf photo Bank containing about 8,300,000 entries. The seller States that the dump was made in 2020.
Journalists have studied a sample of data published by hackers and write that the dump...
Not only do many ransomware operators have their own websites and other resources where they publish data from companies that refused to pay them ransom, but at least one cybercrime group has started using hacked Facebook user accounts to put additional pressure on their victims.
According to...
Scammers have discovered a new way to deceive users — using Google Drive. According to the publication the Wired, hackers abuse the functionality of Google Drive and use it to send supposedly legitimate emails and push notifications from Google, which, if opened, can redirect people to malicious...
Attackers who carry out BEC attacks conduct operations in at least 39 different countries and are responsible for annual losses of $26 billion.
IB specialists from The agari cyber intelligence Department analyzed more than 9 thousand cases of BEC attacks (business email compromise) around the...
This week, Qnap released an update for its QTS operating system, which is running the company's NAS, announcing the correction of two vulnerabilities related to command injection.
Although the developers have not yet disclosed many details about the problems found, it is reported that the bugs...
$20,000 Bitcoin is back on the table if bulls clear this key resistance cluster.
Bitcoin (BTC) price has been showing impressive strength in the previous weeks and today the price made a new 2020 high at $13,666.
This momentum was made alongside weakness in the U.S. dollar and many analysts...
The malware's Telegram channel supports 98 teams.
A security researcher using the alias 3xp0rt discovered a new Remote Access Trojan (RAT) advertised on Russian-language underground hacker forums. A malicious software called T-RAT sells for $ 45, and its main advantage is the ability to...
Can a technological fix really combat a corruption-ridden political order?
Kyrgyzstan’s acting President and Prime Minister Sadyr Japarov has proposed introducing a blockchain-based system to ensure fair elections in the near future and restore public faith in the democratic process. On Oct...
The program will be able to determine the age and the presence of mental illness in a person with an accuracy of 80%.
The Investigative Committee of the Russian Federation has introduced a program to search for serial criminals, developed on the basis of artificial intelligence. This was...
Cybercriminals managed to gain access to about two thousand accounts of the crypto-friendly platform Robinhood. Bloomberg reports this with reference to anonymous sources .
A week earlier, the platform operator said that since September, hackers have cracked the personal email passwords of a...
The British currency company Travelex refused to pay the ransomware and was subjected to a DDoS attack.
Companies around the world receive ransom emails and threats to unleash DDoS attacks on their computer networks if the money is not paid. In particular, such a letter was also received by the...
The total amount of remuneration for discovered vulnerabilities was $ 288,000.
A group of "white hackers" has been hacking into Apple services for three months in order to identify weaknesses in their security system. Researchers have identified 55 vulnerabilities, some of which can be...
There is a difference between Xecuter activity and non-commercial hacking or console emulation.
The US Department of Justice reported that, at their request, the Dominican Republic police arrested Chinese Yuanning Chen, Frenchman Max Loarn and Canadian Gary Bowser. It is assumed that they were...
The attackers did not use malware, they "just" stole email credentials.
Experienced cybercriminals stole $ 15 million from a US company in a carefully crafted fraudulent operation that lasted for two months.
According to the BleepingComputer portal, the cyberattack can be confidently called a...
People continue to turn to Bitcoin and other cryptocurrencies to boost their profits even amid a pandemic.
As the COVID-19 pandemic pushed the Egyptian economy into recession and deepening unemployment, more and more Egyptians see the benefits of trading and mining Bitcoin as an alternative...
Criminals use SlothfulMedia malware to steal information, keylogging and modify files.
The US Department of Defense and the US Department of Homeland Security spoke about malware that is being used by an unnamed group to carry out cyber attacks. CyberScoop sources said the criminals are...