Experts from Israel's Ben-Gurion University demonstrated the AIR-FI attack, a new method for extracting data from machines that are physically isolated from any networks and potentially dangerous peripherals. such computers are often found in government systems and corporate networks, they store...
Foreign government-funded hackers broke into the computer networks of the city of Austin, Texas. As reported by The Intercept, hackers carried out the attack in mid-October of this year and used the network as an infrastructure for cyber attacks. By hacking into Austin's network, criminals could...
A group of cybercriminals used mobile emulators to simulate thousands of mobile devices, allowing them to steal millions of dollars in a matter of days.
According to experts from IBM Security Trusteer, as part of the mobile banking fraud aimed at financial institutions in Europe and the United...
Thousands of organizations are at risk of cyberattacks due to uncorrected urgent/11 and cdpwn vulnerabilities affecting operating technology (ot) and iot devices, respectively.
according to armis specialists, 97% of all ot equipment used today contains uncorrected urgent/11 vulnerabilities...
As SecurityLab wrote earlier, on December 13, SolarWinds reported that it was the victim of a cyber attack on the supply chain. Hackers funded by a foreign government broke into the networks of an American software manufacturer and implemented a malicious update for its Orion software in order...
the israeli developer of artificial intelligence processors habana labs, owned by intel, was subjected to a cyber attack using extortionate software, during which attackers stole confidential data.
The operators of the pay2key ransomware published on their website on the darknet files allegedly...
The number of IoT devices and SCADA systems connected to the Network without appropriate security measures continues to increase, making critical devices vulnerable to potential attacks and hacking attempts. A&O IT Group researchers reported that despite a number of high-profile attacks on SCADA...
Foreign-backed hackers stole data from the U.S. Treasury Department and the National Telecommunications and Information Administration (NTIA).
At the same time, information about which country's authorities are considered to be involved in the incident is not provided.
"The U.S. government is...
Many modern smartphones have a fingerprint scanner to authorize access to the device, log in to your account, confirm payments, and other operations. The scanner is designed for secure authentication, but researchers have discovered new ways to manipulate it for malicious purposes. Security...
Chinese cybercrime group APT is suspected of hacking the network of a Mongolian software company and hacking a chat app used by hundreds of Mongolian government agencies.
According to experts from ESET, the attack occurred in June of this year. Hackers attacked an application called Able...
Critical vulnerabilities were discovered in the main network library that provides the functionality of Valve online games, the exploitation of which allowed attackers to remotely cause video games to crash and even take control of affected third-party game servers to execute arbitrary code...
Users of the MetaMask cryptocurrency wallet have become victims of the current phishing campaign, in which criminals use Google ads to steal money. Victims lost their savings after clicking on a fraudulent ad promoted in a search query as the MetaMask site.
All messages from victims describe...
The European medicines Agency (EEA) responsible for the certification of COVID-19 vaccines was subjected to a cyber attack of an unknown nature. According to a notice on the EALs website, the Agency is currently investigating the incident together with law enforcement agencies.
"EALs was the...
Google announced the launch of a knowledge base with information about a class of vulnerabilities, XS XS-leaks. These vulnerabilities are related to incorrect use of the usual behavior of the web platform by modern web applications, which leads to leakage of information about the user or...
Brazil's Embraer, which is now considered the third-largest aircraft manufacturer after Boeing and Airbus, was the victim of a ransomware cyberattack last month.
Now hackers who compromised the aircraft company's network have published some of the confidential data, as Embraer refused to...
Bitcoin has undergone a strong rally over the past few weeks, rallying from the $11,000 range to $18,700 as of this article’s writing. A comparison between BTC’s current rally and the rally that Tesla saw in late 2019 suggests that in the year ahead, BTC could be primed to see exponential...
Check Point Research reports that in November, the number of phishing emails written on behalf of delivery services increased by 440% compared to October.
The sharpest growth was recorded in Europe, with North America and the Asia-Pacific region taking the second and third places in the number...
Researchers from Prevasio studied 4,000,000 public Docker images hosted on Docker Hub and found that more than half of them have critical vulnerabilities, and several thousand images contain malicious or potentially dangerous elements.
For the analysis, the specialists used their own Prevasio...
Cybersecurity researchers from Kaspersky Lab told about a new backdoor loaded into Windows RAM, which was developed by hackers for Hire (HfH). The backdoor can remotely execute malicious code and steal confidential information.
The malware, called PowerPepper, is linked to the cybercrime group...
Group-IB took part in the Interpol operation "Falcon" to stop the activities of cybercriminals from Nigeria. The group, called Group-IB TMT specialists, has been committing massive hacks of corporate mail for several years and stealing user authentication data from browsers, email, and FTP...