Experts were able to find out who the attackers attacked and how they conducted their operations.
Specialists of the Swiss information security company Prodaft managed to gain access to the servers used by the hacker group associated with the hacking of SolarWinds. Thanks to this, they were...
The attack only affected the operation of the Acer office network, without disrupting production processes.
One of the largest manufacturers of computer equipment, the Taiwanese company Acer, has become another victim of the extortionate operation REvil. According to the publication The Record...
The Ministry of Justice said that Medvedev, "also known as "Stealth," Segmed "and" Serge-bear", pleaded guilty in court.
Russian citizen Sergey Medvedev was sentenced by a court in Nevada to 10 years in prison for committing cybercrimes as part of a group, the damage from which amounted to $568...
The stolen information is being sold at auction, allegedly as part of a charity fundraiser.
Cybercriminals involved in a cyberattack using extortionate software on game developer CD Projekt last month have put the stolen data up for auction.
Emsisoft specialists, who previously identified the...
In this tutorial we will be scanning a target for the well known Heartbleed SSL Bug using the popular Nmap tool on Kali Linux. The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library and was introduced on 31 December on 2011 and released in March 2012...
The XcodeSpy malware consists of a Run Script added to the legitimate Xcode project TabBarInteraction.
Specialists of the information security company SentinelOne told about a new type of malware for macOS, which is used in attacks on iOS developers through Xcode Trojan projects.
The XcodeSpy...
One partner also has access to the systems of a US Navy cruiser, another to the devices of a nuclear power plant, and another to the systems of a weapons factory.
The REvil cybercrime group operates on a "ransomware-as-a-service" business model, in which attackers offer malware to partners who...
In 2020, the FBI received 791,790 complaints about cyber and Internet crimes – a 69% increase over 2019.
According to the FBI's Internet Crime Report for 2020, last year was a record-breaking year for cybercrime damage.
According to the report, in 2020, the FBI received 791,790 complaints...
The history of eSurv is a vivid example of how the business of selling spyware can go "on a curve".
In 2019, SecurityLab reported on the Italian spyware manufacturer eSurv, which infected at least 1 thousand Google Play users with malicious applications. Although the company sold its products...
According to DappRadar, the top four decentralized NFT apps now drive $10 million in volume each day.
The excitement surrounding NFTs is showing no signs of slowing down, with the top four decentralized NFT apps driving more than $10 million in daily volume.
According to decentralized...
Some companies forward SMS messages to another number without requesting permission for this operation or even notifying the user.
A specialist of the Motherboard publication has discovered a dangerous problem, the operation of which allows attackers to secretly redirect SMS messages of victims...
Using vulnerabilities, local attackers can bypass security features.
GRIMM specialists have discovered vulnerabilities in the iSCSI subsystem of the Linux kernel that allow local attackers with basic user privileges to increase their privileges to superuser. Vulnerabilities can only be...
Prime Minister Johnson noted that the importance of cyber capabilities is comparable to how important it was to have combat aircraft a hundred years ago.
The UK will increase its capacity in cyberspace to counter potential adversaries. This is stated in a statement by British Prime Minister...
The hacker is wanted for " hacking computer databases with subsequent theft and dissemination of information."
Police in Lucerne (Switzerland) searched the apartment of hacker Tillie Kottmann, who took responsibility for the massive hacking of video surveillance cameras with face recognition...
The development is being carried out by two unnamed Internet service providers, the Home Office and the UK's National Crime Agency.
Over the past two years, police and Internet companies across the UK have been quietly building and testing surveillance technology that could capture and store...
Other bots, including Archangel, Smart_SearchBot, and Mailsearchbot, have also been disabled at this time
The administrators of the Telegram messenger blocked the "Eye of God" bot, which was used to search for people's personal data in various leaked and open databases.
The blocking is related...
Nvidia's plans to separate gaming and mining demand could be foiled after a custom modification allegedly bypassed the RTX 3060's Ether mining limitations.
Nvidia’s attempt to shift Ether (ETH) miners away from its new GeForce RTX 3060 graphics card by limiting its hash rate appears to have been...
Between February and June 2019, the suspect sent almost 6.5 thousand malicious emails to users in South Korea.
The National Police of South Korea announced the arrest of a 20-year-old suspect on charges of distributing extortionate software GandCrab . The suspect, whose name has not been...
Over the past three months, at least 2.5 thousand fake emails were sent to senior employees of banks and IT companies.
Cybercriminals are sending thousands of phishing emails to Microsoft Office 365 users as part of an ongoing malicious campaign to steal credentials. The attackers give the...
Aker ASA has created a new subsidiary firm to hold Bitcoin on its balance sheet and invest in other companies in the crypto space.
Aker ASA, a $6 billion Oslo Børs-listed holding company is set to begin investing in Bitcoin. According to a press release issued on Monday, Aker has created a new...