The incident can be assessed as a global crisis in the field of cybersecurity.
Thanks to the identified vulnerability in the software from Microsoft, hackers were able to hack about 60 thousand organizations using Microsoft Exchange Server. "A serious vulnerability has been discovered and it...
The British Formula 1 team wanted to introduce the innovative FW43B through an augmented reality app.
An hour before the start of the presentation, the Williams team announced the cancellation of part of the plans for the event. They planned to show the new car using an augmented reality app...
In total, three types of malware were detected — GoldMax, Sibot, and GoldFinger.
Security researchers from Microsoft and FireEye have published separate reports detailing new malware variants that were used by attackers as part of an attack on the SolarWinds supply chain and its customers in...
Bitsquatting is based on a concept known as bit manipulation or bit flipping.
A security researcher under the pseudonym Remy managed to successfully implement on the Microsoft domain (windows.com) an attack called bitsquatting.
Bitsquatting is an attack in which attackers register a fake...
It will take the US government between a year and 18 months to fully recover from the SolarWinds hack.
SolarWinds ' expenses resulting from last year's cybercriminal attack on the supply chain totaled $3.5 million, including costs related to incident investigation and remediation.
The...
The Elasticsearch server, which contains about 2 billion user records, was not password-protected.
An unsecured database of the Ringostat phone call tracking service, whose services are used by customers around the world, mainly in Ukraine and the Russian Federation, was discovered on the...
The decision was made in connection with numerous attacks on MSP in recent years.
NinjaRMM, a company that provides endpoint management software to managed service providers (MSPs), intends to create its own "red Team" of specialists (Red Team) to improve cybersecurity. The decision was made in...
APT10 has actively targeted Indian biotech companies Bharat Biotech and Serum Institute of India.
A Chinese hacker group attacked the IT systems of two Indian manufacturers of vaccines against coronavirus infection (COVID-19), used as part of a campaign to immunize residents of the country.
As...
The hacker group obtained a data array of more than 70 gigabytes, including more than 40 million posts.
In the data received by DDoSecrets, there are more than 40 million publications. Co-founder of the project Emma Best told Wired that it is not only about public posts and profiles, but also...
The updated Unc0ver 6.0.0 jailbreak utility for iPhone supports hacking from iOS 11 to iOS 14.3, iOS 14.4 does not.
The team of hackers of the Apple mobile platform with the experience of Unc0ver has released a jailbreak that works on iOS from version 14 to 14.3 with support for all iPhone...
The database of registered users of GeckoVPN, SuperVPN and ChatVPN is put up for sale on the shadow forum.
The user databases of three popular Android VPN services have been hacked, and now millions of user records are up for sale online. This is reported by techradar.com.
In total, the...
The FriarFox extension gives hackers full access to the victim's Gmail and access to her data for all sites.
Specialists of the information security company Proofpoint told about a Chinese cybercrime group that hacks Gmail accounts using a browser extension.
The cybercrime group TA413 has been...
The problem will also affect Russian government agencies, which are switching to domestic Linux-based operating systems as part of import substitution.
In 2021, the number of attacks on operating systems (OS) and cloud infrastructure based on Linux will increase, IBM expects. \
The problem...
BlackBerry esperts spoke about the development of the "cybercrime as a service" scheme.
Modern cyberattacks are so well prepared that their methods are used by the authorities of some countries, according to BlackBerry.
In their report, experts warn about the emergence of...
The attackers could have obtained data collected in the laboratory on the molecular structure of the coronavirus.
Cybercriminals hacked into the computer systems of Oxford University's Strubi Department of Structural Biology, which conducts research on coronavirus infection (COVID-19).
"We...
The company assured that it has blocked the hacker and is taking additional measures.
The social network Clubhouse announced the leak of conversations of some users who were in a closed room. The reason for this was a hacker attack that was launched on February 20.
An unknown user was able to...
Washington said it would apply not only sanctions to Russia, but also "visible and invisible tools."
The US threatens Russia to respond to an attack by alleged Russian hackers of the US government. Joe Biden's national security adviser, Jake Sullivan, promised that he would make sure that...
As read in the Consumer Protection Fund, the leak occurred in the company's environment and is not the work of hackers.
The Brazilian state consumer protection fund Procon considered unsatisfactory the explanation of the international credit bureau Experian about the large-scale data leakage of...
Over the past couple of months, the volume of phishing attacks using distorted URL prefixes has increased by 5933%.
Security researchers at GreatHorn have discovered a new phishing campaign in which criminals bypass traditional URL protection.
While many phishing scams involve changing the...
To prevent the attack from spreading further, the company shut down its computer systems.
Security standardization and certification company Underwriters Laboratories (UL LLC) was attacked by a ransomware program that encrypted devices in its data center.
To prevent the attack from spreading...