The attackers ' goal is to use the ScreenConnect software to connect to endpoints on client networks.
UAE government departments have been targeted in a new cyber-espionage campaign allegedly orchestrated by Iranian hackers.
According to security researchers from Anomali, the Static Kitten...
Cyber police have exposed an organized group that manufactured and sold fake driver's licenses. Defendants on the Internet accepted applications for the production of European-style driver's licenses.
This was reported by the press service of the Ministry of Internal Affairs.
It is indicated...
Elderly people will be able to voluntarily abandon some of the functions of bank cards in order to protect against fraud.
Representatives of the All-Russian Popular Front (ONF) proposed to protect pensioners from fraudsters and put forward an initiative according to which older people will be...
The aggregate database combined old records from past cyberattacks, including user credentials from Netflix, LinkedIn, Exploit, and more.
3.27 billion of stolen credentials were listed for sale for just $ 2 on the popular cybercriminal forum RaidForums. A forum user using the pseudonym...
Over the past four years, Domestic Kitten has carried out extensive surveillance of users and conducted at least 10 malicious campaigns.
The specialists of the information security company Check Point told about the cyber operations conducted by the APT group Domestic Kitten. The group, also...
A breach of Blockfolio’s signal feed saw racist messages sent to some users of the crypto portfolio platform.
Some Blockfolio users received shocking messages from the app on Tuesday in what has now been confirmed as a breach of the platform’s signal feed.
The hackers responsible for the breach...
Spam attacks on source code and package repositories are a new tactic for cybercriminals.
Spammers bombarded the Python Package Index (PyPI) portal and the source code hosting site GitLab with junk traffic, flooding them with ads for dubious sites and services. Attacks on both resources are...
Fortunately, the attack was stopped in time, and the dangerous levels of chemicals did not have time to get into the water.
An unknown hacker gained unauthorized access to the computer system of a water treatment plant in the city of Oldsmar (Florida, USA) and changed the levels of chemicals to...
Representatives of the UK military services revealed details of the operation to weaken terrorist groups in 2016-2017.
The Director of GCHQ, Jeremy Fleming (Jeremy Fleming) and head of the Strategic command of Britain Patrick Sanders (Patrick Sanders) told the details of the British secret...
Tens of thousands of files with patient data from several hospitals in a number of cities in Texas and the city of Miami were accessed on one of the hacker forums.
Personal data of patients of two hospital networks in the United States was publicly available as a result of a hacker attack, NBC...
Attackers use Plex-based media servers in their attacks.
Operators of custom DDoS attack services have found a new way to strengthen the "garbage" traffic and increase the power of attacks. According to the warning of Netscout specialists specializing in network security issues, cybercriminals...
The investigative part of the Investigative Department of the Ministry of Internal Affairs of Russia in the Smolensk region sent a criminal case to the court against a citizen of one of the neighboring countries, accused of stealing money from bank cards.
From August to December 2013, the man...
The attackers also gained access to one of the customer service portals and stole confidential information.
The French firm Stormshield, which is a major provider of information security services and network security devices for the French government, reported that attackers gained access to...
The victims of the criminals were more than 50 American financial institutions, which lost more than 12 million euros.
As part of an international law enforcement operation led by the Spanish National Police and the US Secret Service and coordinated by Europol, an organized criminal group...
Kobalos is characterized by complex code, which is very rare for malware written under Linux.
ESET researchers told about a new malware attacking supercomputers. Experts named it Kobalos in honor of the character of ancient Greek mythology kobalos-a mischievous spirit who loves to deceive and...
The ransomware attacked an organization in the UK government whose mission is to invest in science and research.
The autonomous government organization UK Research and Innovation (UKRI) was subjected to a cyber attack using extortionate software that encrypted its digital resources. The...
NoxPlayer is designed to run Android applications on computers running Windows and Mac operating systems.
The antivirus company ESET announced the disclosure of its experts of a new attack on the supply chain, the object of which was the mechanism for updating the popular application for gamers...
In another publication, a representative of the group shared a link to the RAR archive with the name "Fonix_decrypter.rar", containing both the decryptor and the decryption master private key.
The decryptor is an administrator tool used within the ransomware group. Sometimes ransomware allows...
It turned out that 39 applications out of 44 have at least one built-in track. 86% of trackers are owned by American companies, such as Google, Facebook and Microsoft.
About 88% of Russian state-owned apps transfer their users ' data to third parties. Most often, the information goes to the...
The purpose of cybercriminals was to collect information and databases containing sensitive information.
The Lebanese Cedar cybercrime group, linked to the Lebanese militant organization Hezbollah, hacked a number of telecom operators and Internet service providers in the United States, Great...