Worldwide, close to 10,000 new Bitcoin ATMs have been installed since March 1, 2020.
Since March 1, 2020, the number of new Bitcoin ATMs installed worldwide is nearing 10,000. According to the latest data from Coin ATM Radar, the current number of machines stands at 16,835, a strong 57.5%...
Over the past three months, at least 2.5 thousand fake emails were sent to senior employees of banks and IT companies.
Cybercriminals are sending thousands of phishing emails to Microsoft Office 365 users as part of an ongoing malicious campaign to steal credentials. The attackers give the...
Aker ASA has created a new subsidiary firm to hold Bitcoin on its balance sheet and invest in other companies in the crypto space.
Aker ASA, a $6 billion Oslo Børs-listed holding company is set to begin investing in Bitcoin. According to a press release issued on Monday, Aker has created a new...
The incident can be assessed as a global crisis in the field of cybersecurity.
Thanks to the identified vulnerability in the software from Microsoft, hackers were able to hack about 60 thousand organizations using Microsoft Exchange Server. "A serious vulnerability has been discovered and it...
The British Formula 1 team wanted to introduce the innovative FW43B through an augmented reality app.
An hour before the start of the presentation, the Williams team announced the cancellation of part of the plans for the event. They planned to show the new car using an augmented reality app...
In total, three types of malware were detected — GoldMax, Sibot, and GoldFinger.
Security researchers from Microsoft and FireEye have published separate reports detailing new malware variants that were used by attackers as part of an attack on the SolarWinds supply chain and its customers in...
Bitsquatting is based on a concept known as bit manipulation or bit flipping.
A security researcher under the pseudonym Remy managed to successfully implement on the Microsoft domain (windows.com) an attack called bitsquatting.
Bitsquatting is an attack in which attackers register a fake...
It will take the US government between a year and 18 months to fully recover from the SolarWinds hack.
SolarWinds ' expenses resulting from last year's cybercriminal attack on the supply chain totaled $3.5 million, including costs related to incident investigation and remediation.
The...
The Elasticsearch server, which contains about 2 billion user records, was not password-protected.
An unsecured database of the Ringostat phone call tracking service, whose services are used by customers around the world, mainly in Ukraine and the Russian Federation, was discovered on the...
The decision was made in connection with numerous attacks on MSP in recent years.
NinjaRMM, a company that provides endpoint management software to managed service providers (MSPs), intends to create its own "red Team" of specialists (Red Team) to improve cybersecurity. The decision was made in...
APT10 has actively targeted Indian biotech companies Bharat Biotech and Serum Institute of India.
A Chinese hacker group attacked the IT systems of two Indian manufacturers of vaccines against coronavirus infection (COVID-19), used as part of a campaign to immunize residents of the country.
As...
The hacker group obtained a data array of more than 70 gigabytes, including more than 40 million posts.
In the data received by DDoSecrets, there are more than 40 million publications. Co-founder of the project Emma Best told Wired that it is not only about public posts and profiles, but also...
The updated Unc0ver 6.0.0 jailbreak utility for iPhone supports hacking from iOS 11 to iOS 14.3, iOS 14.4 does not.
The team of hackers of the Apple mobile platform with the experience of Unc0ver has released a jailbreak that works on iOS from version 14 to 14.3 with support for all iPhone...
The database of registered users of GeckoVPN, SuperVPN and ChatVPN is put up for sale on the shadow forum.
The user databases of three popular Android VPN services have been hacked, and now millions of user records are up for sale online. This is reported by techradar.com.
In total, the...
The FriarFox extension gives hackers full access to the victim's Gmail and access to her data for all sites.
Specialists of the information security company Proofpoint told about a Chinese cybercrime group that hacks Gmail accounts using a browser extension.
The cybercrime group TA413 has been...
The problem will also affect Russian government agencies, which are switching to domestic Linux-based operating systems as part of import substitution.
In 2021, the number of attacks on operating systems (OS) and cloud infrastructure based on Linux will increase, IBM expects. \
The problem...
BlackBerry esperts spoke about the development of the "cybercrime as a service" scheme.
Modern cyberattacks are so well prepared that their methods are used by the authorities of some countries, according to BlackBerry.
In their report, experts warn about the emergence of...
The Risk Alert seemed to take particular aim at broker-dealers, who have been "inadequate" in their AML compliance. The Security and Exchange Commission's Division of Examinations published on Friday a blueprint for investment managers and institutions on how the division will inspect the...
The attackers could have obtained data collected in the laboratory on the molecular structure of the coronavirus.
Cybercriminals hacked into the computer systems of Oxford University's Strubi Department of Structural Biology, which conducts research on coronavirus infection (COVID-19).
"We...
The attacks are part of an ongoing campaign aimed at spying on Vietnamese human rights activists, bloggers and non-profit organizations.
The Vietnamese hacker group APT32 (also known as OceanLotus and SeaLotus) organized a series of spyware attacks targeting Vietnamese human rights defenders...