Articles

Conti ransomware stops working and splits into several groups

Experts report that the Conti ransomware group has ceased operations, its infrastructure is disabled, and the leaders of the group have said that the...

The emergence of cheap DarkCrystal RAT worried experts

Researchers from BlackBerry conducted an analysis of the DarkCrystal RAT (aka DCRat) malware and the activity of its developer on the dark web. Apparently, the malware has...

What is Advanced Threat Protection, and can you fully rely on it?

ATP or advanced threat protection is a premiere suite of analytical tools and malware protection systems that protect against phishing attacks, security threats, and...

Synology and QNAP warn about bugs in their products

Companies have reported numerous critical Netatalk server vulnerabilities. Based on a published report , multiple flaws allow remote attackers to obtain sensitive information and possibly execute arbitrary...

Quantum ransomware operators carried out the attack in almost 4 hours

The attackers used the IcedID malware as one of their initial access vectors. Quantum ransomware, first discovered in August 2021, has been used in fast network attacks. The...

ZingoStealer malware is distributed among criminals for free

Cisco Talos experts have discovered the ZingoStealer malware, which is distributed for free by the Haskers Gang hacker group. The malware is capable of stealing confidential information...

Fodcha botnet attacks over 100 victims daily

Qihoo 360 (360 Netlab) experts report the discovery of a new Fodcha botnet that launches DDoS attacks on hundreds of victims every day. According to the company,...

RaidForums: Law enforcement officers closed the hacker Forum

During the international operation TOURNIQUET , which was coordinated by Europol, the well-known hacker resource RaidForums, which was mainly used to trade in stolen databases, was...

Latest news

50% reduction in Google account hacks after enabling 2SV

One of the main problems is the lack of understanding by users of the benefits of additional authorization procedures. It...

The emergence of cheap DarkCrystal RAT worried experts

Researchers from BlackBerry conducted an analysis of the DarkCrystal RAT (aka DCRat) malware and the activity of its developer on the...

What is Advanced Threat Protection, and can you fully rely on it?

ATP or advanced threat protection is a premiere suite of analytical tools and malware protection systems that protect against...

Must read

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party...

Critical Infrastructure Warning! Millions of PLCs, switches, IoT devices are under threat

Eleven vulnerabilities, combined under the name Urgent / 11,...

You might also likeRELATED
Recommended to you

Attackers use the GitHub server infrastructure for cryptomining

The web service for hosting IT projects GitHub is...

Microsoft Edge browser will warn users about “leaked” passwords

The browser will constantly check the information against databases...

Saferwall : Open Source Malware Analysis

Saferwall is an open source malware analysis platform. It...