News

Chinese hack group GhostEmperor uses new rootkit against Windows 10

At the SAS 2021 conference, Kaspersky Lab analysts spoke about the tools of the new Chinese cyber-espionage group GhostEmperor, which has been attacking large organizations in Southeast Asia...

Google developers told how they will implement Manifest V3

This week, Google revealed exactly how it plans to phase out Manifest V2, which defines the capabilities and limitations for extensions in Chrome. The developers also shared...

DDoS service operator DownThem faces up to 35 years in prison

A California jury found a former DDoS service administrator (DownThem and Ampnode) guilty. Paid users of these services have carried out over 200,000 DDoS attacks both on...

Cyberattack suspends banks in New Zealand

At the moment, it is unclear who is behind the cyberattack and whether it resulted in a data breach. On Wednesday, September 8, a cyberattack...

Attackers scan the network looking for Microsoft Exchange servers vulnerable to ProxyShell

Recently at the Black Hat conference, they talked about the remote code execution vulnerabilities in Microsoft Exchange, collectively known as ProxyShell. Now experts are warning...

Kaseya now has a decryptor for REvil

Representatives of the Kaseya company, whose clients have recently suffered from attacks by the ransomware REvil, said that the company now has a universal tool for...

Microsoft has released its own Linux distribution

This week Microsoft posted on GitHub the first stable build of its own Linux distribution,  CBL-Mariner (Common Base Linux), which was published under the open source...

Mercedes-Benz reports data breaches of 1.6 million customers

The American division of Mercedes-Benz has reported a data breach affecting some of the company's customers. The incident affected 1.6 million records that included customer names, addresses,...

Latest news

Chinese hack group GhostEmperor uses new rootkit against Windows 10

At the SAS 2021 conference, Kaspersky Lab analysts spoke about the tools of the new Chinese cyber-espionage group GhostEmperor, which has...

Vulnerability in macOS Leads to Data Leakage

Microsoft experts said that attackers could use a macOS vulnerability to bypass Transparency, Consent, and Control (TCC) technology and...

Microsoft Defender Log4j Problem Scanner finds non-existent bugs

The media reports that Microsoft Defender for Endpoint is showing false warnings about some kind of "sensor tampering" associated...

Must read

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party...

Critical Infrastructure Warning! Millions of PLCs, switches, IoT devices are under threat

Eleven vulnerabilities, combined under the name Urgent / 11,...

You might also likeRELATED
Recommended to you

Privacy-focused ClearURLs extension removed from Chrome Web Store

Edition Bleeping Computer Note that the browser-based extension ClearURLs, clearing URL-addresses...

Dell PowerEdge Server, trouble on the horizion?

Crisis averted for Dell PowerEdge servers, after a group...

Ubiquiti Networks reported a hack and asks customers to change passwords

Network equipment and IoT device maker Ubiquiti Networks has...