Uncategorized

Morse code Phishing attacks

Microsoft experts  talked about a malicious campaign that has been going on for about a year. According to them, hackers change obfuscation and encryption mechanisms on average...

Malware author Crackonosh earned $ 2 million by attacking 222,000 Windows systems

According to Avast, Malware operator Crackonosh, which is believed to be operating from the Czech Republic, has earned more than 9,000 Monero (roughly $ 2 million...

Avaddon malware operators publish data decryption keys

Operators of the ransomware Avaddon stopped working and provided the Bleeping Computer with the keys to decrypt the victims' data. On the morning of June 11, 2021,...

Critical Vulnerability Attacks Detected in VMware vCenter

The experts warned that attackers are already actively scanning the network in search of VMware vCenter servers vulnerable to the recently fixed critical RCE issue CVE-2021-21985, which scored 9.8 out of 10 on the CVSS v3 vulnerability rating scale.

Tor exit nodes are used to attack users

Over the past 16 months, unknown attackers have infiltrated malicious servers into the Tor network, and then used them to intercept cryptocurrency-related traffic and...

New Moriya Rootkit Targeting Windows Discovered

Kaspersky Lab experts have discovered a rare type of malware - the Moriya rootkit . The fact is that after the release of Windows 10, OS security...

Ransomware attacks Microsoft SharePoint servers

Microsoft SharePoint servers have joined a long list of devices that ransomware uses to infiltrate corporate networks. This list also includes Citrix gateways, F5 BIG-IP...

A patch for another 0-day vulnerability in Google Chrome has been released

Google developers released Chrome version 90.0.4430.85 (for Windows, Mac and Linux), eliminating a zero-day vulnerability that hackers have already actively exploited. The issue is identified as CVE-2021-21224...

Latest news

Google developers told how they will implement Manifest V3

This week, Google revealed exactly how it plans to phase out Manifest V2, which defines the capabilities and limitations for extensions...

Google developers told how they will implement Manifest V3

This week, Google revealed exactly how it plans to phase out Manifest V2, which defines the capabilities and limitations for extensions...

Microsoft Announces Large-Scale Operation BulletProofLink Offering Phishing As A Service

Microsoft experts said BulletProofLink (aka BulletProftLink or Anthrax), a Phishing-as-a-Service (PHaaS), is responsible for many of the recent phishing campaigns targeting...

Must read

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party...

Critical Infrastructure Warning! Millions of PLCs, switches, IoT devices are under threat

Eleven vulnerabilities, combined under the name Urgent / 11,...

You might also likeRELATED
Recommended to you

Lookout! QakBot is back

Seems like the end of this 2020 summer has...

Cellebrite learned how to hack Signal correspondence

Israeli company Cellebrite , which specializes in hacking smartphones,...

Emotet kill switch: Exploiting the exploiters

At the end of July we reported how Emotet...