The UNC2529 group attacked about 50 organizations around the world with phishing emails.
e
Criminals have organized a large-scale phishing campaign against organizations from a wide variety of industries in countries around the world using new types of malware. According to experts from the...
In just the past four months, the number of incidents involving voice copying has increased by 60%.
The number of scammers with voice-copying tools is growing rapidly. Criminals have a variety of materials to teach artificial intelligence algorithms, including audio clips, podcasts, and online...
The attackers exploited a vulnerability in the logic of the Uranium balance modifier, increasing the project's balance by 100 times.
The project of decentralized finance Uranium Finance based on the Binance Smart Chain blockchain was the victim of a cyber attack, as a result of which the...
This campaign is very similar to the attacks through vulnerabilities in the Accellion FTA file sharing solution in December 2020.
Cybercriminals are hacking into corporate and government computer systems to steal sensitive data through two vulnerabilities in a popular file-sharing server. As...
Cybercriminals used fake and hacked accounts to deceive users of the social network.
Facebook specialists have defused the operations of two hacker groups sponsored by the Palestinian authorities. The criminals used the social network to distribute malware for the purpose of espionage...
Malicious updates were distributed in the period from 20 to 22 April this year.
Unknown attackers compromised the Passwordstate corporate password manager update mechanism and used it to install malware on users ' systems.
The developer of Passwordstate, Click Studios, has already sent out...
The malware is capable of stealing data, transferring and deleting files, terminating processes, launching a keylogger, etc.
Attackers have become more likely to use the Telegram messenger as a C & C server in order to distribute malware to steal confidential information. Experts from the...
What is SQL Injection?
SQL Injection is a code injection technique where an attacker executes malicious SQL queries that control a web application’s database. With the right set of queries, a user can gain access to information stored in databases. SQLMAP tests whether a ‘GET’ parameter is...
In total, experts identified 12 malware families associated with attacks on Pulse Secure VPN.
Cybercriminals are attacking corporate networks through a zero-day vulnerability in Pulse Connect Secure gateways ( CVE-2021-22893), for which a fix has not yet been released. According to experts of...
Devices running Android version 10 and earlier are vulnerable to attacks.
Specialists of the information security company CENSUS presented details about the vulnerability they discovered in WhatsApp for Android, which allows you to carry out a Man-in-the-Disk (MitD) attack. The vulnerability...
Everyone's favorite meme cryptocurrency has delivered 12,600% gains in a year and likely created a string of millionaires.
Dogecoin (DOGE), the meme-based altcoin which has become a favorite talking point of Elon Musk, has doubled in 24 hours to hit all-time highs of $0.29.
DOGE/USD 1-hour...
The accused together with his accomplices, was circulated on the Internet, malicious software
One of the members of a group of Russian hackers who stole 15 million rubles from the accounts of commercial organizations, was detained while trying to escape to Kyrgyzstan, said the official...
The hackers ' wallet began receiving cryptocurrency on March 9, just a few days after it became aware of vulnerabilities in Microsoft Exchange.
Cybercriminals are attacking vulnerable Microsoft Exchange servers in order to install cryptocurrency mining software as part of a malicious campaign...
It is not the complete list of items you need to fully build the skimmer but it is the list of the components needed to build the custom board the skimmer operates off of.
Youre welcome.
Aluminium Cap - PCE3885CT-ND
Aluminium Cap - PCE3885CT-ND
CAP-NP - 445-2515-1-ND
CAP-NP - 399-1170-1-ND...
At first, the extortionists demanded $25 million from Pierre Fabre, but when the victim refused to pay, they doubled the amount.
One of the largest pharmaceutical groups in France, Pierre Fabre, has become a victim of the extortionate REvil software. At first, the attackers demanded a ransom of...
The data leaked to the Network is not confidential, but it may be enough for subsequent hacker attacks.
The data of Clubhouse users was published on the hacker forum for free access.
The data contains information such as the account name, user name, linked Twitter and Instagram accounts, the...
This month, access to the switchboard of one of the telecom operators was sold on the darknet.
Cybercriminals are preparing to carry out mass attacks on the bank accounts of Russian users next month. According to DeviceLock, attackers can exploit a vulnerability in mobile communications that...
Gift certificates belong to Airbnb, Amazon, American Airlines, Chipotle, Marriott, Nike, Subway, Target, Walmart, etc.
At one of the largest cybercrime forums, 895 thousand gift certificates worth a total of $38 million were put up for sale. The database contains certificates from several...
Earlier, he was jailed for the largest hacking of financial systems in the history of the United States
In the electronic database of documents of the US judicial system, a document appeared, according to which the Russian Andrey Tyurin, who was sentenced to 12 years in prison, was ordered to...
An hackers, according to CNN, after a large-scale cyber breach in the United States, tried to attack specialists who were supposed to be among the first to respond to the attack.
For months, while U.S. officials were unaware of a cyberattack on U.S. government agencies through the SolarWinds...