Uncategorized

Ransomware attacks Microsoft SharePoint servers

Microsoft SharePoint servers have joined a long list of devices that ransomware uses to infiltrate corporate networks. This list also includes Citrix gateways, F5 BIG-IP...

A patch for another 0-day vulnerability in Google Chrome has been released

Google developers released Chrome version 90.0.4430.85 (for Windows, Mac and Linux), eliminating a zero-day vulnerability that hackers have already actively exploited. The issue is identified as CVE-2021-21224...

760$ million stolen from Bitfinex in 2016 transferred to other wallets

Edition of The Record reports that, according to the Whale Alert and BTCparsers, Bitcoins, stolen in 2016  from Bitfinex Exchange were transferred to other purses   dozens of transactions in...

NAME: WRECK vulnerabilities threaten millions of IoT devices

Forescout experts presented a report on nine vulnerabilities in TCP / IP stacks, collectively named NAME: WRECK . These problems affect hundreds of millions of servers, smart...

Critical bug fixed in Apache OFBiz

The developers of the Apache Software Foundation have fixed a vulnerability in Apache OFBiz that could allow an unauthenticated attacker to remotely take control...

More than 400 phishing campaigns per week were associated with Valentine’s Day

Check Point experts report that hackers "celebrated" Valentine's Day in a big way. The company's analysts recorded more than 400 phishing campaigns dedicated to the holiday every...

Researcher compromised 35 companies through new supply chain attack

nformation security expert Alex Birsan talked about a new problem , which is a variation of the attack on the supply chain, called the dependency confusion...

Popular The Great Suspender Chrome Extension Contains Malware

The Great Suspender extension has been removed from the Chrome Web Store, which suspends unused tabs in the browser and forcibly unloads their resources...

Latest news

Microsoft Edge browser will warn users about “leaked” passwords

The browser will constantly check the information against databases of information about declassified logins and passwords. Continuous monitoring of passwords...

Pareto botnet claims jailbroken devices are TVs

Experts from Human Security (formerly White Ops) have discovered the Pareto botnet that infects Android devices and uses them to scam...

Vulnerable Microsoft Exchange Servers Attacked by Prometei Botnet

Since the patches for ProxyLogon problems were still not fully installed, attackers continue to attack vulnerable Microsoft Exchange servers. Now researchers from Cybereason Nocturnus have discovered the Prometei botnet, which mines Monero cryptocurrency on vulnerable machines.

Must read

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party...

You might also likeRELATED
Recommended to you

2FA defeated by an Alien?

Not an actual little green man mind you; but...

Hundreds of CEOs’ email access is up for sale

The closed Russian-language cybercriminal forum Exploit.in sells access to...

Vulnerability in Telegram allows to determine the user’s location

The Telegram messenger provides users with the People Nearby...