Uncategorized
Hackers of US government agencies used software used by Russian hackers
The hackers hacked the IT systems of US government agencies using tools used by the Russian cybercriminal group Turla. This is stated in a study...
Articles
Nissan source code leaked due to admin: admin credentials
The source code of mobile applications and internal tools of the North American division of Nissan has been leaked to the network. The leak occurred...
Uncategorized
The hyundai.ru user database is up for sale on the shadow forum
According to the telegram channel of information leakage , an announcement on the sale of a database containing data of 1.3 million registered users of the...
Articles
Attackers start using Zyxel backdoor account in attacks
Cyber criminals scan the Web, hoping to find open SSH devices and infiltrate them using hard-coded credentials. We are talking about the so-called backdoor...
Articles
Vulnerability in Telegram allows to determine the user’s location
The Telegram messenger provides users with the People Nearby function, thanks to which it is possible to determine the location of the social network...
Uncategorized
American special services named the target of the attack of Russian hackers
The Federal Bureau of Investigation (FBI), the US Cybersecurity and Infrastructure Protection Agency (CISA) and the US Intelligence Community (ODNI) admitted Russia's involvement in...
Articles
Microsoft’s Windows Core Polaris OS build leaked online
A build of Windows Core Polaris for developers leaked online, confirming once again that Microsoft is actively working on a separate operating system for...
Articles
Google Chrome conflict with anti viruses in Windows 10
In Google Chrome, we fixed a bug due to which antivirus programs installed in Windows 10 could block files generated by the browser. Earlier,...