Articles

Fresh bug in VMware vCenter is already under attack

An exploit for the recently fixed RCE vulnerability in VMware vCenter (CVE-2021-22005) has been published online. Experts warned that hackers had already adopted the exploit. The...

Google developers told how they will implement Manifest V3

This week, Google revealed exactly how it plans to phase out Manifest V2, which defines the capabilities and limitations for extensions in Chrome. The developers also shared...

Microsoft Announces Large-Scale Operation BulletProofLink Offering Phishing As A Service

Microsoft experts said BulletProofLink (aka BulletProftLink or Anthrax), a Phishing-as-a-Service (PHaaS), is responsible for many of the recent phishing campaigns targeting companies and organizations. It should be...

New vulnerability in macOS allows an attacker to remotely execute commands

The researcher found a bug in the macOS Finder that allows an attacker to run commands on Mac computers with any version of macOS...

DDoS service operator DownThem faces up to 35 years in prison

A California jury found a former DDoS service administrator (DownThem and Ampnode) guilty. Paid users of these services have carried out over 200,000 DDoS attacks both on...

Exploit for 0-day vulnerability in Windows MSHTML published

Researchers warn that cybercriminals are already sharing tutorials and exploits for the CVE-2021-40444 vulnerability on hacker forums, allowing more hackers to exploit the new...

The number of attacks on Microsoft Exchange Server grew by 170% in a month

Kaspersky Lab researchers report that in August 2021, the company's products blocked 19,839 attacks on users of Microsoft Exchange servers. The surge in malicious activity...

Babuk ransomware sources published on the hacker forum

A group of vx-Underground researchers noticed that the full source code of the Babuk ransomware has been published on the Russian-language hack forum. A member of the...

Latest news

Google developers told how they will implement Manifest V3

This week, Google revealed exactly how it plans to phase out Manifest V2, which defines the capabilities and limitations for extensions...

Google developers told how they will implement Manifest V3

This week, Google revealed exactly how it plans to phase out Manifest V2, which defines the capabilities and limitations for extensions...

Microsoft Announces Large-Scale Operation BulletProofLink Offering Phishing As A Service

Microsoft experts said BulletProofLink (aka BulletProftLink or Anthrax), a Phishing-as-a-Service (PHaaS), is responsible for many of the recent phishing campaigns targeting...

Must read

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party...

Critical Infrastructure Warning! Millions of PLCs, switches, IoT devices are under threat

Eleven vulnerabilities, combined under the name Urgent / 11,...

You might also likeRELATED
Recommended to you

North Korean hackers are interested in data on vaccines against COVID-19

Kaspersky Lab researchers have prepared a report on the activity of...

Encryption algorithms for 2G networks have been intentionally weakened

A group of scientists from several European universities published...

Google urged Chromium developers to ditch Windows 7

Eleven months after Microsoft officially ended technical support for the Windows...