Critical vulnerabilities were discovered in the main network library that provides the functionality of Valve online games, the exploitation of which allowed attackers to remotely cause video games to crash and even take control of affected third-party game servers to execute arbitrary code...
Users of the MetaMask cryptocurrency wallet have become victims of the current phishing campaign, in which criminals use Google ads to steal money. Victims lost their savings after clicking on a fraudulent ad promoted in a search query as the MetaMask site.
All messages from victims describe...
The European medicines Agency (EEA) responsible for the certification of COVID-19 vaccines was subjected to a cyber attack of an unknown nature. According to a notice on the EALs website, the Agency is currently investigating the incident together with law enforcement agencies.
"EALs was the...
Google announced the launch of a knowledge base with information about a class of vulnerabilities, XS XS-leaks. These vulnerabilities are related to incorrect use of the usual behavior of the web platform by modern web applications, which leads to leakage of information about the user or...
Bitcoin has undergone a strong rally over the past few weeks, rallying from the $11,000 range to $18,700 as of this article’s writing. A comparison between BTC’s current rally and the rally that Tesla saw in late 2019 suggests that in the year ahead, BTC could be primed to see exponential...
Check Point Research reports that in November, the number of phishing emails written on behalf of delivery services increased by 440% compared to October.
The sharpest growth was recorded in Europe, with North America and the Asia-Pacific region taking the second and third places in the number...
Researchers from Prevasio studied 4,000,000 public Docker images hosted on Docker Hub and found that more than half of them have critical vulnerabilities, and several thousand images contain malicious or potentially dangerous elements.
For the analysis, the specialists used their own Prevasio...
Cybersecurity researchers from Kaspersky Lab told about a new backdoor loaded into Windows RAM, which was developed by hackers for Hire (HfH). The backdoor can remotely execute malicious code and steal confidential information.
The malware, called PowerPepper, is linked to the cybercrime group...
Group-IB took part in the Interpol operation "Falcon" to stop the activities of cybercriminals from Nigeria. The group, called Group-IB TMT specialists, has been committing massive hacks of corporate mail for several years and stealing user authentication data from browsers, email, and FTP...
The Check Point Research team found a spike in hacker activity over the past six weeks. The fact is that due to the restrictions associated with COVID-19, online shopping has reached a new level this year, and the number of online purchases on black Friday and cyber Monday is breaking all...
The operators of one of the oldest active botnets in existence today, Stantinko, have updated their Trojan for Linux, and now, to bypass detection, it disguises itself as a legitimate Apache web server (httpd) process.
The stantinko botnet was first discovered in 2012 and initially only...
Sophos, a British provider of cybersecurity solutions, is notifying customers of an incident that the company encountered earlier this week. The official announcement reads:
"on November 24, 2020, Sophos became aware of a problem with access rights to the tool used to store information about...
During a NATO cyber exercise in Estonia on November 16-20, experts practiced catching government-funded hackers using specially set traps.
1,000 people took part in the exercise, which was coordinated by the cyber security Training center under the Estonian Ministry of defense. If the previous...
Security researchers have reported an increase in cyber attacks using Google services as a weapon to circumvent security measures and steal credentials, credit card data and other personal information.
A team of experts from Armorblox analyzed five phishing campaigns, which they call the "tip...
Trustwave researchers discovered a vulnerability in the GO SMS Pro app installed more than 100,000,000 times. Because of the bug, multimedia files (voice messages, videos, and images) that users exchange are now available to anyone.
You can even extract files from the app server that were...
At the beginning of this week, a major provider of managed web hosting solutions Managed[.] com suffered from a ransomware attack. The company was forced to shut down all its servers, and the incident even affected client sites. According to media reports, the responsibility for this attack lies...
Independent information security expert Pedro Oliveira spoke about the bug CVE-2020-15647, which he discovered in the spring of this year in Firefox for Android. A specially created HTML file could be used to steal cookies from the victim's device.
The vulnerability was how Firefox handles...
One of the world's largest cryptocurrency exchanges, Liquid, reported the attack last week. The company said that on November 13, 2020, an unknown attacker compromised the email accounts of several employees and eventually penetrated the company's internal network.
The administration of Liquid...
The American Corporation Twitter Inc has hired one of the hackers Payter Zatko, previously known by the network alias Mudge, as the head of the security service.
Zatko will report directly to CEO Jack Dorsey. It is planned that it will take over the management of key security functions. In an...
The us company Microsoft has recorded cyber attacks by Russian and North Korean hackers on seven companies that develop vaccines and medicines for coronavirus. This is stated in a statement by Microsoft Vice President of security Tom Burt.
The text says that three groups under the code names...