Some companies forward SMS messages to another number without requesting permission for this operation or even notifying the user.
A specialist of the Motherboard publication has discovered a dangerous problem, the operation of which allows attackers to secretly redirect SMS messages of victims...
Using vulnerabilities, local attackers can bypass security features.
GRIMM specialists have discovered vulnerabilities in the iSCSI subsystem of the Linux kernel that allow local attackers with basic user privileges to increase their privileges to superuser. Vulnerabilities can only be...
Prime Minister Johnson noted that the importance of cyber capabilities is comparable to how important it was to have combat aircraft a hundred years ago.
The UK will increase its capacity in cyberspace to counter potential adversaries. This is stated in a statement by British Prime Minister...
The hacker is wanted for " hacking computer databases with subsequent theft and dissemination of information."
Police in Lucerne (Switzerland) searched the apartment of hacker Tillie Kottmann, who took responsibility for the massive hacking of video surveillance cameras with face recognition...
Nvidia's plans to separate gaming and mining demand could be foiled after a custom modification allegedly bypassed the RTX 3060's Ether mining limitations.
Nvidia’s attempt to shift Ether (ETH) miners away from its new GeForce RTX 3060 graphics card by limiting its hash rate appears to have been...
Between February and June 2019, the suspect sent almost 6.5 thousand malicious emails to users in South Korea.
The National Police of South Korea announced the arrest of a 20-year-old suspect on charges of distributing extortionate software GandCrab . The suspect, whose name has not been...
Aker ASA has created a new subsidiary firm to hold Bitcoin on its balance sheet and invest in other companies in the crypto space.
Aker ASA, a $6 billion Oslo Børs-listed holding company is set to begin investing in Bitcoin. According to a press release issued on Monday, Aker has created a new...
The incident can be assessed as a global crisis in the field of cybersecurity.
Thanks to the identified vulnerability in the software from Microsoft, hackers were able to hack about 60 thousand organizations using Microsoft Exchange Server. "A serious vulnerability has been discovered and it...
The British Formula 1 team wanted to introduce the innovative FW43B through an augmented reality app.
An hour before the start of the presentation, the Williams team announced the cancellation of part of the plans for the event. They planned to show the new car using an augmented reality app...
In total, three types of malware were detected — GoldMax, Sibot, and GoldFinger.
Security researchers from Microsoft and FireEye have published separate reports detailing new malware variants that were used by attackers as part of an attack on the SolarWinds supply chain and its customers in...
Bitsquatting is based on a concept known as bit manipulation or bit flipping.
A security researcher under the pseudonym Remy managed to successfully implement on the Microsoft domain (windows.com) an attack called bitsquatting.
Bitsquatting is an attack in which attackers register a fake...
It will take the US government between a year and 18 months to fully recover from the SolarWinds hack.
SolarWinds ' expenses resulting from last year's cybercriminal attack on the supply chain totaled $3.5 million, including costs related to incident investigation and remediation.
The...
The Elasticsearch server, which contains about 2 billion user records, was not password-protected.
An unsecured database of the Ringostat phone call tracking service, whose services are used by customers around the world, mainly in Ukraine and the Russian Federation, was discovered on the...
The hacker group obtained a data array of more than 70 gigabytes, including more than 40 million posts.
In the data received by DDoSecrets, there are more than 40 million publications. Co-founder of the project Emma Best told Wired that it is not only about public posts and profiles, but also...
The updated Unc0ver 6.0.0 jailbreak utility for iPhone supports hacking from iOS 11 to iOS 14.3, iOS 14.4 does not.
The team of hackers of the Apple mobile platform with the experience of Unc0ver has released a jailbreak that works on iOS from version 14 to 14.3 with support for all iPhone...
The database of registered users of GeckoVPN, SuperVPN and ChatVPN is put up for sale on the shadow forum.
The user databases of three popular Android VPN services have been hacked, and now millions of user records are up for sale online. This is reported by techradar.com.
In total, the...
The FriarFox extension gives hackers full access to the victim's Gmail and access to her data for all sites.
Specialists of the information security company Proofpoint told about a Chinese cybercrime group that hacks Gmail accounts using a browser extension.
The cybercrime group TA413 has been...
BlackBerry esperts spoke about the development of the "cybercrime as a service" scheme.
Modern cyberattacks are so well prepared that their methods are used by the authorities of some countries, according to BlackBerry.
In their report, experts warn about the emergence of...
The Risk Alert seemed to take particular aim at broker-dealers, who have been "inadequate" in their AML compliance. The Security and Exchange Commission's Division of Examinations published on Friday a blueprint for investment managers and institutions on how the division will inspect the...
The attackers could have obtained data collected in the laboratory on the molecular structure of the coronavirus.
Cybercriminals hacked into the computer systems of Oxford University's Strubi Department of Structural Biology, which conducts research on coronavirus infection (COVID-19).
"We...