Kaspersky Lab experts have discovered a new version of the unofficial WhatsApp application for Android,…
Kaspersky Lab experts report that attackers are increasingly imitating problems with Windows and tricking Russian-speaking…
Avast experts have discovered malware hidden in at least 28 third-party extensions for Google Chrome and Microsoft Edge. All of these extensions were…
Subscribe to our newsletter to get our newest articles instantly!
The carder darknet resource BidenCash again staged a high-profile "advertising campaign". The site administration published a huge dump containing information about 1,221,551 bank cards for…
Intel has confirmed the leaked UEFI BIOS documentation and source code for Alder Lake processors (the code name for 12th generation Intel processors that have…
Due to a bug in an update, Microsoft Defender incorrectly identified Google Chrome, Microsoft Edge, Discord, Spotify, and other Electron apps as a Win32/Hive.ZY threat…
ESET analysts have discovered the Worok cyber-espionage group, which has been active since at least 2020. These hackers mainly attack government agencies and well-known companies…
The second largest school district in the US, LAUSD (Los Angeles Unified School District, Los Angeles Unified School District), reported that its IT systems were…
Law enforcement agencies have completed an international operation, as a result of which control over the website and domains of the underground marketplace WT1SHOP was…
The developers of the “hacker Tamagotchi” Flipper Zero said that for two months now they have not been able to return $ 1.3 million that…
Resecurity experts discovered the EvilProxy phishing platform that offers reverse proxies to unskilled attackers and promises to steal authentication tokens to bypass multi-factor authentication (MFA)…
The AgainstTheWest (aka BlueHornet) group claims to have acquired a huge 790 GB dump after successfully hacking TikTok and WeChat. Allegedly, the hackers managed to…
The source code for the CodeRAT remote access trojan has been published on GitHub. This happened after the security researchers identified the malware developer and…
Experts from eSentire have determined that the infrastructure used to attack Cisco in May 2022 was used to compromise an unnamed HR solutions company a…
Unknown attackers hacked the Neopets website, which was founded back in 1999 and offers the opportunity to have virtual pets, as well as interact, communicate…
Google developers have released Chrome 105.0.5195.102 for Windows, Mac and Linux, where they fixed a 0-day vulnerability that hackers are already exploiting. This is the…
Samsung representatives reported that as early as the end of July 2022, the company's systems in the US were compromised. As the investigation showed, the…
Qnap has warned customers about a new wave of DeadBolt ransomware attacks. This time, the malware exploited a zero-day vulnerability in Photo Station, which the…
Last week, Google introduced a new bug bounty program. This bug bounty is for researchers who discover vulnerabilities in the company's open source projects. Let…
Securonix researchers have noticed an interesting malware campaign that distributes malware called GO#WEBBFUSCATOR written in Go. To spread it, hackers use phishing emails, malicious documents,…
According to Cisco Talos, between March and June 2022, hackers organized three related campaigns, delivering various malware to compromised machines, including RAT ModernLoader, RedLine Stealer,…
Analysts at McAfee found five extensions for Google Chrome in the Chrome Web Store that were fraudulent with user data. Specifically, the extensions tracked when…
Group-IB specialists have published a detailed report on the 0ktapus campaign. Experts said the recent phishing attacks against Twilio and Cloudflare employees were part of…
Sign in to your account