Attacks & Breaches

The number of attacks on Microsoft Exchange Server grew by 170% in a month

Kaspersky Lab researchers report that in August 2021, the company's products blocked 19,839 attacks on users of Microsoft Exchange servers. The surge in malicious activity...

Attackers scan the network looking for Microsoft Exchange servers vulnerable to ProxyShell

Recently at the Black Hat conference, they talked about the remote code execution vulnerabilities in Microsoft Exchange, collectively known as ProxyShell. Now experts are warning...

Vulnerable Microsoft Exchange Servers Attacked by Prometei Botnet

Since the patches for ProxyLogon problems were still not fully installed, attackers continue to attack vulnerable Microsoft Exchange servers. Now researchers from Cybereason Nocturnus have discovered the Prometei botnet, which mines Monero cryptocurrency on vulnerable machines.

Attackers use the GitHub server infrastructure for cryptomining

The web service for hosting IT projects GitHub is investigating a series of attacks on its cloud infrastructure, in which cybercriminals use the company's...

Nissan source code leaked due to admin: admin credentials

The source code of mobile applications and internal tools of the North American division of Nissan has been leaked to the network. The leak occurred...

Ho.mobile Data Breach – Ho.Mobile Users Data are being Sold on Darknet

In the last days of 2020, rumors about the theft of data from 2.5 million ho.mobile users have raised many concerns, and it seems that the...

Microsoft has identified the ultimate target of hackers hacked into SolarWinds

According to Microsoft experts, the ultimate goal of the hackers who hacked SolarWinds was to gain access to the cloud assets of the victims...

Whirlpool became a victim of Nefilim operators, part of the data was leaked to the Network

The American corporation Whirlpool, one of the largest manufacturers of household appliances in the world, closes 2020 with a not very pleasant incident: the...

Latest news

Chinese hack group GhostEmperor uses new rootkit against Windows 10

At the SAS 2021 conference, Kaspersky Lab analysts spoke about the tools of the new Chinese cyber-espionage group GhostEmperor, which has...

Vulnerability in macOS Leads to Data Leakage

Microsoft experts said that attackers could use a macOS vulnerability to bypass Transparency, Consent, and Control (TCC) technology and...

Microsoft Defender Log4j Problem Scanner finds non-existent bugs

The media reports that Microsoft Defender for Endpoint is showing false warnings about some kind of "sensor tampering" associated...

Must read

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party...

Critical Infrastructure Warning! Millions of PLCs, switches, IoT devices are under threat

Eleven vulnerabilities, combined under the name Urgent / 11,...

You might also likeRELATED
Recommended to you

PoC code published for exploiting vulnerability in Windows from 2006

Tenable security researcher David Wells has posted details and...

Apple in trouble? Researchers find over 50 vulnerabilities

It's not as often that we hear about Apple's...