Most recent articles by:

Threat IT Staff

Hackers of US government agencies used software used by Russian hackers

The hackers hacked the IT systems of US government agencies using tools used by the Russian cybercriminal group Turla. This is stated in a study...

Nissan source code leaked due to admin: admin credentials

The source code of mobile applications and internal tools of the North American division of Nissan has been leaked to the network. The leak occurred...

The hyundai.ru user database is up for sale on the shadow forum

According to the telegram channel of information leakage , an announcement on the sale of a database containing data of 1.3 million registered users of the...

Attackers start using Zyxel backdoor account in attacks

Cyber criminals scan the Web, hoping to find open SSH devices and infiltrate them using hard-coded credentials. We are talking about the so-called backdoor...

Vulnerability in Telegram allows to determine the user’s location

The Telegram messenger provides users with the People Nearby function, thanks to which it is possible to determine the location of the social network...

American special services named the target of the attack of Russian hackers

The Federal Bureau of Investigation (FBI), the US Cybersecurity and Infrastructure Protection Agency (CISA) and the US Intelligence Community (ODNI) admitted Russia's involvement in...

Microsoft’s Windows Core Polaris OS build leaked online

A build of Windows Core Polaris for developers leaked online, confirming once again that Microsoft is actively working on a separate operating system for...

Google Chrome conflict with anti viruses in Windows 10

In Google Chrome, we fixed a bug due to which antivirus programs installed in Windows 10 could block files generated by the browser. Earlier,...