On the site Perl.com there was a notification about the sale of this domain, also containing the contact details of the registrar.
Perl programming language specialist Brian Fay, reported that control over the domain Perl.com it was intercepted by unknown cybercriminals.
"We're still trying to...
The attackers tricked employees of USCellular retail stores into downloading malware to their computers.
Mobile operator USCellular was the victim of a data leak after attackers gained access to its customer relationship management (CRM) system.
According to a security incident notice filed...
Personal data of Dutch citizens was sold through Telegram and Snapchat.
Dutch law enforcement officials have arrested two people involved in the trafficking of COVID-19 patients ' data. This was reported by RTL Nieuws reporter Daniel Verlaan, who discovered ads for Dutch citizens ' data on...
According to the seller, with the help of this data, buyers will be able to get at least $10 thousand in tokens.
The cybercrime forum has put up for sale the data of 2 million paid subscribers of the adult site MyFreeCams. According to the seller, the database came into his possession recently...
Hackers used applications with privileged access to Microsoft Office 365 and Azure environments.
Security researchers from the information security firm Malwarebytes have confirmed that the cybercriminals responsible for the attack on the SolarWinds supply chain were able to access the...
The attackers exploited the vulnerability in the Secure Mobile Access VPN device and the NetExtender VPN client.
The manufacturer of hardware security solutions SonicWall has published an urgent notification about the penetration of hackers into its internal systems through a zero-day...
Several prominent on-chain analysts and traders have turned short-term neutral to slightly bearish on Bitcoin as BTC struggles to reclaim $33,000.
Ki Young Ju, the CEO at CryptoQuant and an on-chain analyst, says Bitcoin (BTC) is neutral to short-term bearish for the time being.
There are two...
The criminal allegedly gained access to detailed information about the company's profits and losses.
Tech giant Intel was the victim of a cyberattack in which an attacker stole financial confidential information from its corporate website. This was reported by the Financial Times.
The American...
WPCracker
WordPress user enumeration and login Brute Force tool for Windows and Linux
With the Brute Force tool, you can control how aggressive an attack you want to perform, and this affects the attack time required. The tool makes it possible to adjust the number of threads as well as how...
Bugs in Signal, Google Duo, and Facebook Messenger allowed the called party's device to transmit audio before it answered the call.
Vulnerabilities in a variety of mobile applications for video communication allowed attackers to listen to the surrounding sounds without the user's permission...
iFinex Inc needs another 30 days to produce trial documents for the New York Attorney General.
iFinex Inc — the parent company of crypto exchange Bitfinex and stablecoin issuer Tether (USDT) — has written to the New York Supreme Court requesting that its upcoming trial date be pushed back even...
Hackers used applications with privileged access to Microsoft Office 365 and Azure environments.
Security researchers from the information security firm Malwarebytes have confirmed that the cybercriminals responsible for the attack on the SolarWinds supply chain were able to access the...
Criminals could go unpunished because evidence collected from crime scenes was not recorded in the electronic system.
The UK government is assessing the possible consequences of a "technical error" that caused 150,000 records to be deleted from police databases, including suspects '...
The decision was made due to numerous complaints and criticism from users and competitors.
The administration of the instant messaging service WhatsApp has postponed the introduction of its new policy, according to which users must share data with the social network Facebook. This decision was...
The US authorities reported hacking of cloud corporate accounts due to employees ' failure to comply with the requirements of cyber hygiene.
The US Cybersecurity and Infrastructure Security Agency (CISA) has reported a series of successful cyber attacks on a number of cloud services.
According...
MSTR declined by as much as 12.6% on Monday as Bitcoin pulled back sharply from $40,000 levels.
Shares of MicroStrategy (MSTR), a business intelligence firm with considerable exposure to Bitcoin (BTC), declined sharply on Monday as profit-taking ensued following a parabolic rally over the past...
A Kaspersky Lab study claims that the malware used by attackers during a cyberattack on US government agencies in December is similar to tools that are linked to Russian hackers.
Hackers broke into the IT systems of US government agencies using tools used by the Russian cybercrime group Turla...
Unauthorized access to the file-sharing service of the central bank of New Zealand was obtained by an unknown group of hackers, the press service of the regulator reported on January 10.
image
Unauthorized access to the file-sharing service of the central bank of New Zealand was obtained by an...
Operators of the chastitylock ransomware attacked users and blocked their IoT devices, depriving the wearer of the opportunity to remove it.
The source code of the chastitylock ransomware, which is used to carry out attacks on users of the" smart " Bluetooth lock of male chastity, has now been...
The database contains 1.3 million records of registered users.
According to the telegram channel of information leakage, an announcement about the sale of a database containing the data of 1.3 million registered users of the site appeared on the shadow forum hyundai.ru.
According to the...