Millions of pounds are "leaking" from the budget of the United Kingdom to destroy the "Russian identity" in the member countries of the Commonwealth of Independent States.
The UK government allocates 20% of the country's total budget to combat " Kremlin propaganda and disinformation." This was...
For the second time in several years, the attackers managed to hack into the mail servers of the State Department.
Hackers have stolen thousands of official emails from the US State Department. Although the incident took place last year, it was not reported to the general public. Hacking was the...
The damage in the criminal case is estimated at tens of millions of rubles.
Law enforcement officers detained a hacker who, as part of a group of people, installed malicious software on the computers of commercial organizations in Moscow and obtained tens of millions of rubles from firms...
According to the attackers, they managed to steal 40 GB of corporate data from Boggi Milano.
Italian premium menswear brand Boggi Milano has been subjected to a cyberattack using extortionate software. According to Bloomberg, representatives of the company confirmed the fact of the cyber attack...
To get into the App Store, the attackers misled Apple by describing their program as a means to encrypt files.
Users lost at least $1.6 million due to a fraudulent service masquerading as the Trezor hardware wallet application.
One of the victims, Phillipe Christodoulou, found an app in the App...
For the second time in several years, the attackers managed to hack the State Department's email servers.
Hackers have stolen thousands of official emails from the US State Department. Although the incident took place last year, it was not reported to the general public. The hack was the second...
Vulnerabilities allow you to bypass security by using the Linux kernel's support for extended eBPF modules.
image
On Monday, March 29, security researchers revealed two vulnerabilities in Linux distributions that allow you to bypass protection against speculative attacks like Spectre and get...
Experts have identified 21,248 hacked Microsoft Exchange servers with a backdoor connecting to the brian[.]krebsonsecurity[.]top domain.
In the case of mass hacks of Microsoft Exchange servers, new data has emerged indicating the possible involvement of a well-known journalist Brian Krebs, who...
Damages in a criminal case is estimated at tens of millions of rubles
Law enforcement officers detained a hacker who, as part of a group of individuals, installed malicious software on the computers of commercial organizations in Moscow and received tens of millions of rubles from companies...
The description of the tool indicates that after activation, it is able to identify the true Internet address of the subject.
Employees of the Federal Bureau of Investigation (FBI) paid The Innocent Lives Foundation (ILF), a non-profit organization dedicated to exposing criminals, $250 thousand...
As a result of the cyberattack, the credentials of almost 300 thousand forum participants were compromised.
A Carding Mafia forum linked to the purchase and sale of stolen financial information and credit card data has been hacked. According to the service for checking compromised data Have I...
The malware received a worm-like module that allows you to scan and infect Windows-based systems available on the Network during attacks.
The Purple Fox malware, which was previously distributed using exploit kits and phishing emails, has now released a worm-like module. The new feature allows...
According to the company, the incident affected only its own systems.
Canadian manufacturer of IoT devices Sierra Wireless reported that this week its IT systems were attacked by ransomware.
Sierra Wireless specializes in the production of wireless communication equipment. Sierra Wireless...
Bloomberg reports that a group of hackers managed to gain access to surveillance cameras installed in Tesla, Equinox, medical clinics, prisons and banks. In addition to the images from the cameras, the hackers published screenshots proving that they had direct access to the surveillance systems...
Experts were able to find out who the attackers attacked and how they conducted their operations.
Specialists of the Swiss information security company Prodaft managed to gain access to the servers used by the hacker group associated with the hacking of SolarWinds. Thanks to this, they were...
The Ministry of Justice said that Medvedev, "also known as "Stealth," Segmed "and" Serge-bear", pleaded guilty in court.
Russian citizen Sergey Medvedev was sentenced by a court in Nevada to 10 years in prison for committing cybercrimes as part of a group, the damage from which amounted to $568...
The stolen information is being sold at auction, allegedly as part of a charity fundraiser.
Cybercriminals involved in a cyberattack using extortionate software on game developer CD Projekt last month have put the stolen data up for auction.
Emsisoft specialists, who previously identified the...
In this tutorial we will be scanning a target for the well known Heartbleed SSL Bug using the popular Nmap tool on Kali Linux. The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library and was introduced on 31 December on 2011 and released in March 2012...
The XcodeSpy malware consists of a Run Script added to the legitimate Xcode project TabBarInteraction.
Specialists of the information security company SentinelOne told about a new type of malware for macOS, which is used in attacks on iOS developers through Xcode Trojan projects.
The XcodeSpy...
According to DappRadar, the top four decentralized NFT apps now drive $10 million in volume each day.
The excitement surrounding NFTs is showing no signs of slowing down, with the top four decentralized NFT apps driving more than $10 million in daily volume.
According to decentralized...