Articles
New malware downloads Cobalt Strike via PNG image from Imgur
A security researcher using the Arkbird alias talked about a new malware that uses Word files with macros to download PowerShell scripts from GitHub. The script additionally...
Articles
Cyberpunk 2077 Android Ransomware ! Encrypt ALL Android Files!
ThreatIT Reports for the second time after ThreatIT first article about CyberPunk2077 and after Kaspersky Lab specialists discovered malware that was disguised as a beta version...
Articles
List of MageCart malware hacked stores has been revealed
Sansec experts noticed that the dropper of an unnamed hack group infecting online stores with MageCart malware (web skimmers) contains a list of compromised...
Articles
Gitpaste-12 is back with a vengance
The Gitpaste-12 worm that spreads via GitHub and also hosts malicious payload on Pastebin, has returned with even more exploits. While the first iteration...
Articles
Malware in Ruby Gems repository For Second Time
Sonatype experts have discovered the pretty_color and ruby-bitcoin malicious packages in the official RubyGems repository. The malware has already been removed from the platform.
The malware hidden in...
Articles
Pay2Key ransomware Attacked Again! Intel-owned Habana Labs Were attacked !
Edition Bleeping Computer reports that the Israeli company Habana Labs, which develops solutions in the field of AI, since 2019 owned by the Intel, was attacked...
Articles
PgMiner botnet attacks poorly protected PostgreSQL databases
Palo Alto Networks specialists discovered the PgMiner botnet, which specializes in hacking poorly protected PostgreSQL databases in order to install miners.
The botnet operates according to a...
Articles
NjRAT use Pastebin as a management server
Analysts at Palo Alto Networks report that since at least October of this year, operators of the njRAT trojan have been using Pastebin as a control...
Latest news
Microsoft Edge browser will warn users about “leaked” passwords
The browser will constantly check the information against databases of information about declassified logins and passwords. Continuous monitoring of passwords...
NAME: WRECK vulnerabilities threaten millions of IoT devices
Forescout experts presented a report on nine vulnerabilities in TCP / IP stacks, collectively named NAME: WRECK . These problems affect hundreds...
Pwn2Own ended 2021. Windows 10, Ubuntu, Safari, Chrome, Zoom and more were successfully jailbroken
The largest hacking competition - the spring Pwn2Own 2021 - has ended. This time it all ended in a...
Must read
28 dangerous extensions detected for Google Chrome and Microsoft Edge
Avast experts have discovered malware hidden in at least 28 third-party...
Critical Infrastructure Warning! Millions of PLCs, switches, IoT devices are under threat
Eleven vulnerabilities, combined under the name Urgent / 11,...
You might also likeRELATEDRecommended to you
Vietnamese APT group goes into mining along with cyber espionage operations
APT groups are not limited to Iran, Russia, China...
Apple in trouble? Researchers find over 50 vulnerabilities
It's not as often that we hear about Apple's...