Articles
Google Docs Vulnerability allowed to view other people’s documents
Google has patched a vulnerability in its feedback tool used in its services. The vulnerability made it possible to steal screenshots of confidential documents from...
Articles
Hackers Sell RDP, DDoS attacks and payment card data on the darknet
Cybersecurity researchers at Flashpoint reported rising prices for access to RDP servers, stolen payment card data, and a DDoS-as-a-service business model in underground forums and marketplaces.
“As...
Articles
Lists of Companies Affected by the SolarWinds Hack has Published
Several information security companies have published lists of SolarWinds customers who have been affected by the hacking of the company and the infection of the Orion...
Articles
Script to detect vulnerable TCP / IP stacks
Forescout has released an open source tool to help identify network devices running TCP / IP stacks affected by the "Amnesia: 33" vulnerability bundle.
We...
Articles
Malware from Magecart’s arsenal accidentally exposed the list of hacked sites
A list of dozens of online stores hacked by a web skimming group was accidentally leaked through the Remote Access Trojan Installer (RAT).
Attackers install...
Articles
Five months before the SolarWinds backdoor was sent out, hackers carried out a test attack
Cybercriminals who hacked Texas-based software maker SolarWinds launched a mock attack last year to test their capabilities. They started distributing third-party files from SolarWinds networks...
Articles
Cyberpunk 2077 Ransomware?
Cyberpunk 2077 - Just as we tough that 2020 couldn't get any weirder...a group of researchers discovered a ransomware strain being distributed camouflaged as...
Articles
Microsoft detects malicious SolarWinds files on its networks
Microsoft discovered malware on its networks, adding to the list of companies affected by the hack of the Texas software maker SolarWinds.
Microsoft is users of SolarWinds'...
Latest news
Microsoft Edge browser will warn users about “leaked” passwords
The browser will constantly check the information against databases of information about declassified logins and passwords. Continuous monitoring of passwords...
LastPass for Android found seven built-in trackers
German cybersecurity expert Mike Kuketz noticed that there are seven trackers in the LastPass app for Android that monitor users.
The researcher...
More than 400 phishing campaigns per week were associated with Valentine’s Day
Check Point experts report that hackers "celebrated" Valentine's Day in a big way. The company's analysts recorded more than 400 phishing campaigns...
Must read
28 dangerous extensions detected for Google Chrome and Microsoft Edge
Avast experts have discovered malware hidden in at least 28 third-party...
Critical Infrastructure Warning! Millions of PLCs, switches, IoT devices are under threat
Eleven vulnerabilities, combined under the name Urgent / 11,...
You might also likeRELATEDRecommended to you
Ryuk attack will cost Sopra Steria € 50 million
The losses of the largest IT provider Sopra Steria...
Drupal has fixed critical bugs for which there are already exploits
Two dangerous vulnerabilities associated with the use of the...
Hackers Sell RDP, DDoS attacks and payment card data on the darknet
Cybersecurity researchers at Flashpoint reported rising prices for access to RDP...