Vulnerabilities & Threats

Google Docs Vulnerability allowed to view other people’s documents

Google has patched a vulnerability in its feedback tool used in its services. The vulnerability made it possible to steal screenshots of confidential documents from...

Hackers Sell RDP, DDoS attacks and payment card data on the darknet

Cybersecurity researchers at Flashpoint reported rising prices for access to RDP servers, stolen payment card data, and a DDoS-as-a-service business model in underground forums and marketplaces. “As...

Lists of Companies Affected by the SolarWinds Hack has Published

Several information security companies have published lists of SolarWinds customers who have been affected by the hacking of the company  and the infection of the Orion...

Script to detect vulnerable TCP / IP stacks

Forescout has released an open source tool to help identify network devices running TCP / IP stacks affected by the "Amnesia: 33" vulnerability bundle. We...

Malware from Magecart’s arsenal accidentally exposed the list of hacked sites

A list of dozens of online stores hacked by a web skimming group was accidentally leaked through the Remote Access Trojan Installer (RAT). Attackers install...

Five months before the SolarWinds backdoor was sent out, hackers carried out a test attack

Cybercriminals who hacked Texas-based software maker SolarWinds launched a mock attack last year to test their capabilities. They started distributing third-party files from SolarWinds networks...

Cyberpunk 2077 Ransomware?

Cyberpunk 2077 - Just as we tough that 2020 couldn't get any weirder...a group of researchers discovered a ransomware strain being distributed camouflaged as...

Microsoft detects malicious SolarWinds files on its networks

Microsoft discovered malware on its networks, adding to the list of companies affected by the hack of the Texas software maker SolarWinds. Microsoft is users of SolarWinds'...

Latest news

Microsoft Edge browser will warn users about “leaked” passwords

The browser will constantly check the information against databases of information about declassified logins and passwords. Continuous monitoring of passwords...

LastPass for Android found seven built-in trackers

German cybersecurity expert Mike Kuketz noticed that there are seven trackers in the LastPass app for Android that monitor users. The researcher...

More than 400 phishing campaigns per week were associated with Valentine’s Day

Check Point experts report that hackers "celebrated" Valentine's Day in a big way. The company's analysts recorded more than 400 phishing campaigns...

Must read

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party...

You might also likeRELATED
Recommended to you

Ryuk attack will cost Sopra Steria € 50 million

The losses of the largest IT provider Sopra Steria...

Drupal has fixed critical bugs for which there are already exploits

Two dangerous vulnerabilities associated with the use of the...

Hackers Sell RDP, DDoS attacks and payment card data on the darknet

Cybersecurity researchers at Flashpoint reported rising prices for access to RDP...