Experts were able to find out who the attackers attacked and how they conducted their operations.
Specialists of the Swiss information security company Prodaft managed to gain access to the servers used by the hacker group associated with the hacking of SolarWinds. Thanks to this, they were...
An important new role for the world’s first cryptocurrency as an inflation gauge — or just another fantasy of Bitcoin maximalists?
Throughout the middle of March, many Americans received stimulus checks from the government, and while the payments — $1,400 for every U.S. citizen earning less than...
The attack only affected the operation of the Acer office network, without disrupting production processes.
One of the largest manufacturers of computer equipment, the Taiwanese company Acer, has become another victim of the extortionate operation REvil. According to the publication The Record...
The Ministry of Justice said that Medvedev, "also known as "Stealth," Segmed "and" Serge-bear", pleaded guilty in court.
Russian citizen Sergey Medvedev was sentenced by a court in Nevada to 10 years in prison for committing cybercrimes as part of a group, the damage from which amounted to $568...
The stolen information is being sold at auction, allegedly as part of a charity fundraiser.
Cybercriminals involved in a cyberattack using extortionate software on game developer CD Projekt last month have put the stolen data up for auction.
Emsisoft specialists, who previously identified the...
In this tutorial we will be scanning a target for the well known Heartbleed SSL Bug using the popular Nmap tool on Kali Linux. The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library and was introduced on 31 December on 2011 and released in March 2012...
The XcodeSpy malware consists of a Run Script added to the legitimate Xcode project TabBarInteraction.
Specialists of the information security company SentinelOne told about a new type of malware for macOS, which is used in attacks on iOS developers through Xcode Trojan projects.
The XcodeSpy...
One partner also has access to the systems of a US Navy cruiser, another to the devices of a nuclear power plant, and another to the systems of a weapons factory.
The REvil cybercrime group operates on a "ransomware-as-a-service" business model, in which attackers offer malware to partners who...
In 2020, the FBI received 791,790 complaints about cyber and Internet crimes – a 69% increase over 2019.
According to the FBI's Internet Crime Report for 2020, last year was a record-breaking year for cybercrime damage.
According to the report, in 2020, the FBI received 791,790 complaints...
The history of eSurv is a vivid example of how the business of selling spyware can go "on a curve".
In 2019, SecurityLab reported on the Italian spyware manufacturer eSurv, which infected at least 1 thousand Google Play users with malicious applications. Although the company sold its products...
Historical analysis suggests that the amount of time it takes for the Bitcoin price to double may accelerate during this bull run.
The price of Bitcoin has doubled in the past 75 days, prompting some analysts to question whether the market is approaching over-extension.
However, historical...
According to DappRadar, the top four decentralized NFT apps now drive $10 million in volume each day.
The excitement surrounding NFTs is showing no signs of slowing down, with the top four decentralized NFT apps driving more than $10 million in daily volume.
According to decentralized...
Some companies forward SMS messages to another number without requesting permission for this operation or even notifying the user.
A specialist of the Motherboard publication has discovered a dangerous problem, the operation of which allows attackers to secretly redirect SMS messages of victims...
Using vulnerabilities, local attackers can bypass security features.
GRIMM specialists have discovered vulnerabilities in the iSCSI subsystem of the Linux kernel that allow local attackers with basic user privileges to increase their privileges to superuser. Vulnerabilities can only be...
Prime Minister Johnson noted that the importance of cyber capabilities is comparable to how important it was to have combat aircraft a hundred years ago.
The UK will increase its capacity in cyberspace to counter potential adversaries. This is stated in a statement by British Prime Minister...
The hacker is wanted for " hacking computer databases with subsequent theft and dissemination of information."
Police in Lucerne (Switzerland) searched the apartment of hacker Tillie Kottmann, who took responsibility for the massive hacking of video surveillance cameras with face recognition...
The development is being carried out by two unnamed Internet service providers, the Home Office and the UK's National Crime Agency.
Over the past two years, police and Internet companies across the UK have been quietly building and testing surveillance technology that could capture and store...
Other bots, including Archangel, Smart_SearchBot, and Mailsearchbot, have also been disabled at this time
The administrators of the Telegram messenger blocked the "Eye of God" bot, which was used to search for people's personal data in various leaked and open databases.
The blocking is related...
Nvidia's plans to separate gaming and mining demand could be foiled after a custom modification allegedly bypassed the RTX 3060's Ether mining limitations.
Nvidia’s attempt to shift Ether (ETH) miners away from its new GeForce RTX 3060 graphics card by limiting its hash rate appears to have been...
Between February and June 2019, the suspect sent almost 6.5 thousand malicious emails to users in South Korea.
The National Police of South Korea announced the arrest of a 20-year-old suspect on charges of distributing extortionate software GandCrab . The suspect, whose name has not been...