A breach of Blockfolio’s signal feed saw racist messages sent to some users of the crypto portfolio platform.
Some Blockfolio users received shocking messages from the app on Tuesday in what has now been confirmed as a breach of the platform’s signal feed.
The hackers responsible for the breach...
Spam attacks on source code and package repositories are a new tactic for cybercriminals.
Spammers bombarded the Python Package Index (PyPI) portal and the source code hosting site GitLab with junk traffic, flooding them with ads for dubious sites and services. Attacks on both resources are...
Fortunately, the attack was stopped in time, and the dangerous levels of chemicals did not have time to get into the water.
An unknown hacker gained unauthorized access to the computer system of a water treatment plant in the city of Oldsmar (Florida, USA) and changed the levels of chemicals to...
Satellite - Easy-To-Use Payload Hosting
Satellite is an web payload hosting service which filters requests to ensure the correct target is getting a payload. This can also be a useful service for hosting files that should be only accessed in very specific circumstances.
Quickstart Guide...
Representatives of the UK military services revealed details of the operation to weaken terrorist groups in 2016-2017.
The Director of GCHQ, Jeremy Fleming (Jeremy Fleming) and head of the Strategic command of Britain Patrick Sanders (Patrick Sanders) told the details of the British secret...
Tens of thousands of files with patient data from several hospitals in a number of cities in Texas and the city of Miami were accessed on one of the hacker forums.
Personal data of patients of two hospital networks in the United States was publicly available as a result of a hacker attack, NBC...
Attackers use Plex-based media servers in their attacks.
Operators of custom DDoS attack services have found a new way to strengthen the "garbage" traffic and increase the power of attacks. According to the warning of Netscout specialists specializing in network security issues, cybercriminals...
The investigative part of the Investigative Department of the Ministry of Internal Affairs of Russia in the Smolensk region sent a criminal case to the court against a citizen of one of the neighboring countries, accused of stealing money from bank cards.
From August to December 2013, the man...
The attackers also gained access to one of the customer service portals and stole confidential information.
The French firm Stormshield, which is a major provider of information security services and network security devices for the French government, reported that attackers gained access to...
The victims of the criminals were more than 50 American financial institutions, which lost more than 12 million euros.
As part of an international law enforcement operation led by the Spanish National Police and the US Secret Service and coordinated by Europol, an organized criminal group...
The criminals have published a list of organizations that they do not intend to attack, including hospitals, schools, small businesses, etc.
The operators of the ransomware Babyk (also known as Babuk) have created their own data leak site to publish the stolen data of victims as part of a...
Kobalos is characterized by complex code, which is very rare for malware written under Linux.
ESET researchers told about a new malware attacking supercomputers. Experts named it Kobalos in honor of the character of ancient Greek mythology kobalos-a mischievous spirit who loves to deceive and...
The ransomware attacked an organization in the UK government whose mission is to invest in science and research.
The autonomous government organization UK Research and Innovation (UKRI) was subjected to a cyber attack using extortionate software that encrypted its digital resources. The...
NoxPlayer is designed to run Android applications on computers running Windows and Mac operating systems.
The antivirus company ESET announced the disclosure of its experts of a new attack on the supply chain, the object of which was the mechanism for updating the popular application for gamers...
In another publication, a representative of the group shared a link to the RAR archive with the name "Fonix_decrypter.rar", containing both the decryptor and the decryption master private key.
The decryptor is an administrator tool used within the ransomware group. Sometimes ransomware allows...
The level of cybercrime in Russia has increased 20-fold over the past seven years and continues to increase. This is reported by TASS with reference to the head of the Department for investigation of cybercrime and crimes in the sphere of high technologies RF IC Constantine Camarda.
The negative...
The purpose of cybercriminals was to collect information and databases containing sensitive information.
The Lebanese Cedar cybercrime group, linked to the Lebanese militant organization Hezbollah, hacked a number of telecom operators and Internet service providers in the United States, Great...
Scammers send out emails to consumers with links to the websites of real companies in order to build trust.
British consumers lost 78 million pounds ($109 million) to so-called "clone firms" last year, as financial problems linked to the pandemic convinced many to make rash investments. As...
The attackers tricked employees of USCellular retail stores into downloading malware to their computers.
Mobile operator USCellular was the victim of a data leak after attackers gained access to its customer relationship management (CRM) system.
According to a security incident notice filed...
Experts have recorded 550 reports of double extortion on the sites of data leaks of various extortionate groups.
In 2020, ransomware operators resorted to a double-extortion strategy, in which attackers steal victims ' unencrypted files and then threaten to publish them if a ransom is not paid...