The Check Point Research team found a spike in hacker activity over the past six weeks. The fact is that due to the restrictions associated with COVID-19, online shopping has reached a new level this year, and the number of online purchases on black Friday and cyber Monday is breaking all...
The operators of one of the oldest active botnets in existence today, Stantinko, have updated their Trojan for Linux, and now, to bypass detection, it disguises itself as a legitimate Apache web server (httpd) process.
The stantinko botnet was first discovered in 2012 and initially only...
During a NATO cyber exercise in Estonia on November 16-20, experts practiced catching government-funded hackers using specially set traps.
1,000 people took part in the exercise, which was coordinated by the cyber security Training center under the Estonian Ministry of defense. If the previous...
Trustwave researchers discovered a vulnerability in the GO SMS Pro app installed more than 100,000,000 times. Because of the bug, multimedia files (voice messages, videos, and images) that users exchange are now available to anyone.
You can even extract files from the app server that were...
At the beginning of this week, a major provider of managed web hosting solutions Managed[.] com suffered from a ransomware attack. The company was forced to shut down all its servers, and the incident even affected client sites. According to media reports, the responsibility for this attack lies...
Independent information security expert Pedro Oliveira spoke about the bug CVE-2020-15647, which he discovered in the spring of this year in Firefox for Android. A specially created HTML file could be used to steal cookies from the victim's device.
The vulnerability was how Firefox handles...
One of the world's largest cryptocurrency exchanges, Liquid, reported the attack last week. The company said that on November 13, 2020, an unknown attacker compromised the email accounts of several employees and eventually penetrated the company's internal network.
The administration of Liquid...
The American Corporation Twitter Inc has hired one of the hackers Payter Zatko, previously known by the network alias Mudge, as the head of the security service.
Zatko will report directly to CEO Jack Dorsey. It is planned that it will take over the management of key security functions. In an...
The us company Microsoft has recorded cyber attacks by Russian and North Korean hackers on seven companies that develop vaccines and medicines for coronavirus. This is stated in a statement by Microsoft Vice President of security Tom Burt.
The text says that three groups under the code names...
Bleeping Computer reports that over the weekend, a hacker forum put up for sale a database of the popular 123rf photo Bank containing about 8,300,000 entries. The seller States that the dump was made in 2020.
Journalists have studied a sample of data published by hackers and write that the dump...
Not only do many ransomware operators have their own websites and other resources where they publish data from companies that refused to pay them ransom, but at least one cybercrime group has started using hacked Facebook user accounts to put additional pressure on their victims.
According to...
The world's second-largest laptop manufacturer, Taiwan-based Compal, whose factories produced laptops for Apple, Acer, Lenovo, Dell, Toshiba, HP and Fujitsu, has fallen victim to ransomware. Judging by the screenshot of the ransom note, the cybercrime group DoppelPaymer may be behind the attack...
The 26-year-old Ukrainian citizen used test accounts to steal gift cards, which he then sold online.
A Seattle district court has sentenced a former Microsoft software engineer to nine years in prison for 18 felonies that caused more than $10 million in property damage to the company.
The...
Security researchers from the company Cybereason told about the new malware that was used by the North Korean group Kimsuky (also known as Black Banshee, Velvet Chollima and Thallium) during attacks on government institutions in South Korea.
Earlier, the cybersecurity and infrastructure...
The Japanese Corporation Capcom, which is one of the world's largest developers and publishers of computer video games, was the victim of a cyber attack that disrupted business operations and email systems.
"Some Capcom networks have experienced issues affecting access to certain systems...
Scammers have discovered a new way to deceive users — using Google Drive. According to the publication the Wired, hackers abuse the functionality of Google Drive and use it to send supposedly legitimate emails and push notifications from Google, which, if opened, can redirect people to malicious...
This week, Qnap released an update for its QTS operating system, which is running the company's NAS, announcing the correction of two vulnerabilities related to command injection.
Although the developers have not yet disclosed many details about the problems found, it is reported that the bugs...
The Cybercrime group Phosphorus (also known as APT35) sent fake emails to former government officials, scientists, heads of major organizations and politicians, posing as the organizers of the Munich security conference and the Think 20 (T20) summit in Saudi Arabia. According to Microsoft...
Hundreds of thousands of sites running popular content management systems (CMS) WordPress, Joomla, Magneto and Drupal were hacked and included in the kashmirblack botnet, used by cybercriminals for cryptocurrency mining, fraud and deface.
According to the information security company Imperva...
The computer systems of the largest Indian news Agency Press Trust of India (PTI) were subjected to a large-scale attack using ransomware, which disrupted the operation of servers for several hours. This was reported by the Hindu Business Line newspaper.
The attack by LockBit ransomware...