Articles

Babuk ransomware sources published on the hacker forum

A group of vx-Underground researchers noticed that the full source code of the Babuk ransomware has been published on the Russian-language hack forum. A member of the...

Researchers have learned to bypass PIN codes for Mastercard and Maestro cards

A group of scientists from the Swiss Higher Technical School of Zurich has found a way to bypass PIN codes on Mastercard and Maestro contactless cards. In...

Cloudflare coped with DDoS attack with a capacity of 17.2 million HTTP requests per second

Cloudflare announced the prevention of the largest DDoS attack to date, reaching 17.2 million HTTP requests per second, three times the power of other known attacks. The...

Morse code Phishing attacks

Microsoft experts  talked about a malicious campaign that has been going on for about a year. According to them, hackers change obfuscation and encryption mechanisms on average...

Attackers scan the network looking for Microsoft Exchange servers vulnerable to ProxyShell

Recently at the Black Hat conference, they talked about the remote code execution vulnerabilities in Microsoft Exchange, collectively known as ProxyShell. Now experts are warning...

LemonDuck botnet becomes an increasingly dangerous cyber threat

Experts suggest that LemonDuck may soon turn into a Malware-as-a-Service business model. Over the past two years, the LemonDuck cryptocurrency mining malware has evolved into...

Experts: BlackMatter ransomware was created by the authors of the recently “closed” DarkSide

Last week, experts noticed the emergence of a new ransomware BlackMatter, which combines the "best" features of the now defunct DarkSide and REvil. In particular, then the...

Haron and CGP Ransomware: Same Malware used by Different Threat Actors

Almost three quarters of ransomware attacks result in the data being encrypted. 51% of organizations were hit by ransomware in the last year. The...

Latest news

Chinese hack group GhostEmperor uses new rootkit against Windows 10

At the SAS 2021 conference, Kaspersky Lab analysts spoke about the tools of the new Chinese cyber-espionage group GhostEmperor, which has...

Chinese hack group GhostEmperor uses new rootkit against Windows 10

At the SAS 2021 conference, Kaspersky Lab analysts spoke about the tools of the new Chinese cyber-espionage group GhostEmperor, which has...

Fresh bug in VMware vCenter is already under attack

An exploit for the recently fixed RCE vulnerability in VMware vCenter (CVE-2021-22005) has been published online. Experts warned that hackers...

Must read

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party...

Critical Infrastructure Warning! Millions of PLCs, switches, IoT devices are under threat

Eleven vulnerabilities, combined under the name Urgent / 11,...

You might also likeRELATED
Recommended to you

Advertising of ransomware was banned on the XSS hacker forum

The administration of the popular hacker forum XSS (formerly...

The Ransomwhere project creates a database of ransomware payments

Project  Ransomwhere , created by a student at Stanford University and...

New Kerberos Exploit for Bronze Bit attack Has Been Published

NetSPI security specialist Jake Karnes has published detailed information...