Most recent articles by:

Threat IT Staff

NAME: WRECK vulnerabilities threaten millions of IoT devices

Forescout experts presented a report on nine vulnerabilities in TCP / IP stacks, collectively named NAME: WRECK . These problems affect hundreds of millions of servers, smart...

Pwn2Own ended 2021. Windows 10, Ubuntu, Safari, Chrome, Zoom and more were successfully jailbroken

The largest hacking competition - the spring Pwn2Own 2021 - has ended. This time it all ended in a three-way draw between Team Devcore...

Attackers use the GitHub server infrastructure for cryptomining

The web service for hosting IT projects GitHub is investigating a series of attacks on its cloud infrastructure, in which cybercriminals use the company's...

The Coinhive domain is used to warn users about hacked resources

The creator of Have I Been Pwned, Troy Hunt, uses the domains of Coinhive, a cryptojacking service that was closed in 2019, to alert...

Privacy-focused ClearURLs extension removed from Chrome Web Store

Edition Bleeping Computer Note that the browser-based extension ClearURLs, clearing URL-addresses from any tracker, designed for surveillance and intelligence, has been removed from Chrome Web Store. ClearURLs...

Hackers began to exploit a serious vulnerability in F5 BIG-IP

Earlier this month, F5 Networks released patches to fix four critical bugs in BIG-IP and BIG-IQ. Then the developers wrote that these vulnerabilities can lead to denial...

Critical bug fixed in Apache OFBiz

The developers of the Apache Software Foundation have fixed a vulnerability in Apache OFBiz that could allow an unauthenticated attacker to remotely take control...

Avast Analysts Examined OnionCrypter

Avast Threat Labs researchers report on the OnionCrypter cryptor, which has been widely used by many malware families since 2016, including Ursnif, Lokibot, Zeus, AgentTesla, and...