Search results

  1. Tomcat

    Innostage at Positive Hack Days-2: key points and results of the cyber festival

    From May 23 to 26, the international cyber festival Positive Hack Days-2 was held at the Luzhniki Olympic Complex. A large-scale event brought together experts, customers of information security services and everyone interested in the world of cybersecurity. A rich program, productive...
  2. Tomcat

    IoT is not a toy for children. How hacker attacks on the Internet of Things scare not only large corporations, but also ordinary families.

    In the previous text, we talked about the most serious hacker attacks on Internet of Things devices. But left out are not the obvious decisions of the attackers, directed not against corporations, but against ordinary people. Trend Micro analysts say that hacked IoT devices are usually used: 1...
  3. Tomcat

    GitHub identified an attack on individual employees of IT companies

    GitHub has identified a small social engineering campaign targeting the personal accounts of tech firm employees. No GitHub or npm systems were compromised during this campaign, the platform says. Attackers use a combination of repository prompts and malicious npm package dependencies. Many of...
  4. Tomcat

    Hackers have started using WormGPT to aid in phishing attacks

    SlashNext has released a study showing that attackers use generative artificial intelligence technologies to prepare and implement phishing attacks and distribute malware. They use OpenAI's ChatGPT and WormGPT cybercrime tool. The latter is based on the GPTJ language model, which was...
  5. Tomcat

    Hackers used Microsoft policy to change the signature date of malicious drivers to July 29, 2015

    Microsoft has blocked 13 code signing certificates. They were used by Chinese hackers and developers to sign and load malicious Kernel-Mode Drivers into compromised systems using the FuckCertVerify and HookSignTool tools. Certificate offers on websites The tools have been around since 2018...
  6. Tomcat

    True horror: cybersecurity in the automotive industry

    The auto industry took its first step into the digital age back in 1967, when the Volkswagen Typ 3 was released in Germany with the D-Jetronic electronic injection system from Bosch. Today, computer systems control almost all functions of most cars - from engine operating modes to windshield...
  7. Tomcat

    How the creators of malicious software try to avoid detection: let’s look at the example of Spy.GmFUToMitm

    Specialists from the Positive Technologies Expert Security Center (PT Expert Security Center) have discovered an interesting example of malware spreading in the Chinese segment of the Internet. This software is used, among other things, to carry out MITM attacks, and its main feature is the...
  8. Tomcat

    The Lurk virus hacked banks while it was written by ordinary remote workers for hire

    In May of this year, the publishing house Individuum published a book by journalist Daniil Turovsky “Invasion. A Brief History of Russian Hackers." It contains stories from the dark side of the Russian IT industry - about guys who, having fallen in love with computers, learned not just to...
  9. Tomcat

    From Linux to Windows: how does Hellhound bypass the protection of Russian companies?

    Hackers have attacked at least 48 organizations by 2024. In November 2023, experts from the Positive Technologies Cybersecurity Expert Center (PT Expert Security Center) published their first study on attacks by the previously unknown hacker group Hellhounds on Russian companies. The study...
  10. Tomcat

    More than 300 cyber attacks in 3 months: Sapphire Werewolf targets Russia's most important sectors

    Hackers have developed their own open-source malware based on SapphireStealer. BI. ZONE has warned about the activity of the hacker group Sapphire Werewolf, which has been conducting cyber attacks against Russian organizations since the beginning of March 2024. During this period, attackers...
  11. Tomcat

    Thieves use deepfakes to trick companies into sending them money

    Since their appearance in December 2017, deepfakes, videos with an almost perfect face replacement created by a neural network, have caused panic among experts. Many, for example, were then afraid that now “revenge porn” would become even easier, when an ex-boyfriend with a sufficiently powerful...
  12. Tomcat

    New tactics of the old Android Trojan

    One day you want to sell something on Avito and, having posted a detailed description of your product (for example, a RAM module), you will receive this message. Once you open the link, you will see a seemingly innocuous page notifying you, the happy and successful seller, that a purchase has...
  13. Tomcat

    The dangers of hacker attacks on IoT devices: real stories

    The infrastructure of a modern metropolis is built on Internet of Things devices: from video cameras on the roads to large hydroelectric power stations and hospitals. Hackers are able to turn any connected device into a bot and then use it to carry out DDoS attacks. The motives can be very...
  14. Tomcat

    The problem of classifying hackers by danger

    There is only this space, completely familiar, in which there are no surprises. It is fully lit, every inch is under supervision. But beyond the perimeter there is such impenetrable darkness that you can’t see anything even a meter away. And hands reach out from this darkness. Armed hands. With...
  15. Tomcat

    Anonymization of data does not guarantee your complete anonymity

    There is an opinion that “anonymized” information, which many companies love to collect and use, will not actually protect a person from de-anonymization if the data suddenly leaks online or is used in someone else’s interests. Cloud4Y tells you if this is true. Last fall, Adblock Plus founder...
  16. Tomcat

    Privacy? No, we haven't heard

    In the Chinese city of Suzhou (Anhui province), street cameras were used to identify people wearing the “wrong” clothes. Using facial recognition software, officials identified violators and publicly shamed them by posting photos and personal information online. The city administration...
  17. Tomcat

    How the bank “broke”

    A failed IT infrastructure migration resulted in the corruption of 1.3 billion bank customer records. This was all due to insufficient testing and a frivolous attitude towards complex IT systems. Cloud4Y tells how it happened. In 2018, the English bank TSB realized that its two-year-old...
  18. Tomcat

    How a hacker's mother entered a prison and infected the boss's computer

    What are you willing to do to successfully complete the project? Don't sleep at night, send your family on vacation so they don't distract you, drink gallons of coffee and energy drinks? There are better options. Cloud4Y tells the amazing story of a cybersecurity analyst. John Strand, who had...
  19. Tomcat

    Informal interviews with hackers

    I recently came across the channel of Ivan Novikov (D0znpp), CEO of Wallarm, who writes his episodes without editing and almost every day (about life in America, Y Combinator, sales and investments), and I discovered a lot of useful information there. I decided to share a couple of issues “about...
  20. Tomcat

    Microsoft explained how hackers evaded detection in the SolarWinds attack

    Microsoft shared details of its investigation into how hackers managed to remain undetected when hacking SolarWinds systems. The report was presented by experts from Microsoft 365 Defender, Microsoft Threat Intelligence Center (MSTIC) and Microsoft Cyber Defense Operations Center (CDOC). The...
Top