Search results

  1. Lord777

    Updated SysJoker challenges Israel

    The sensational backdoor returns with new methods of cyber warfare. The Check Point Research team is monitoring the active development of SysJoker, a cross-platform backdoor that is believed to have been used by a Hamas-linked hacker group to attack Israel. Among the key changes in SysJoker is...
  2. Lord777

    FBI warns of unusual attacks on gambling establishments

    Customers and casino employees should not call unfamiliar numbers to "secure" their systems. The FBI warns of a growing number of cyber attacks on gambling businesses. Especially vulnerable are small establishments and, oddly enough, casinos owned by Native Americans. Criminals use remote...
  3. Lord777

    Turkish intelligence rescued a Palestinian hacker from Mossad

    Turkey's National Intelligence Agency has rescued Palestinian hacker Omar A., who managed to hack into Israel's Iron Dome missile defense system, Sabah newspaper reported, without naming its sources. According to the publication, hacker Omar A., who temporarily disabled the Iron Dome system in...
  4. Lord777

    New threat to macOS users: Web browser updates may turn out to be a trap

    The Atomic Stealer program remains a loyal assistant for many criminals. Cybersecurity experts have discovered a new threat to macOS users. The Atomic Stealer malware, also known as AMOS, is now being distributed through fake web browser updates. This is happening as part of a campaign called...
  5. Lord777

    Google Bard "hacks" YouTube: watches videos and tells content

    Now the user can watch the video without turning it on. Google continues to improve its Bard chatbot. Particular attention is drawn to a recent update that provides Bard integration with YouTube. Now Bard is able to analyze videos, highlighting key information, and the user does not even need...
  6. Lord777

    Negotiable Cookie Collection Penalties: UK may Change Online Shopping Experience

    The ICO regulator introduces strict measures to control the operation of sites that collect cookies. The Information Commissioner's Office (ICO) of the United Kingdom has put forward a requirement that the process of refusing to use cookies becomes as simple as consent to their use. This...
  7. Lord777

    British and Korean intelligence agencies warn of North Korean spying threat

    What other ways will the country replenish its treasury? The national Cybersecurity Centers of the United Kingdom and South Korea warn of an increase in the number and complexity of attacks on software supply chains from North Korea. South Korea's National Intelligence Service (NIS) and the...
  8. Lord777

    London & Zurich customers have been unable to make debit transactions for two weeks due to a cyber attack

    What will the unprecedented operational delays mean for the UK economy? A recent cyber attack on a British company that specializes in collecting direct debit payments caused serious cash flow problems for customers, some of whom had to take out short-term loans due to the resulting debts with...
  9. Lord777

    Cyber spies from XDSpy attack Russian metallurgists and military-industrial enterprises

    Experts from the Threat Intelligence Department and the F. A. C. C. T. Cybersecurity Center warn of new attacks by the XDSpy cyberespionage group. Yesterday, November 22, and the day before yesterday, November 21, malicious mailings were detected targeting the mail of one of the Russian...
  10. Lord777

    Bug bounty payments in Russia are comparable to rewards on global platforms

    Positive Technologies summed up the results of the Standoff 365 Bug Bounty vulnerability search platform, launched in May 2022.In a year and a half, the number of hosted programs has increased from 2 to 53 and continues to grow. The amount of remuneration is from 9 thousand to 3 million rubles...
  11. Lord777

    Alliance of the Three Fraternities

    In northern Myanmar, the Three Brotherhood Alliance, an armed group consisting of representatives of three ethnic groups, announced the beginning of a military operation in the city of Laukkaing on the border with China. The city is located in the northeastern part of Myanmar, in the Shan...
  12. Lord777

    In the US, $9 million was seized from fraudulent lovers

    About $9 million in the Tether stablecoin was seized from scammers who stole victims funds through romance scams and cryptocurrency scams. According to the US Department of Justice, the seized funds were traced to cryptocurrency addresses allegedly linked to an organized network of fraudsters...
  13. Lord777

    InfectedSlurs Botnet

    Akamai analysts warn that the new Mirai botnet InfectedSlurs exploits two 0-day vulnerabilities for remote code execution on routers and NVR (Network Video Recorder). Infected devices become part of a DDoS botnet, which is then rented out to other attackers for profit. Although researchers...
  14. Lord777

    Expert Advisor: Mining pools block transactions from sub-sanctioned addresses

    ViaBTC, Foundry USA, and F2Pool blocked transactions involving addresses from the OFAC SDN list. Filtering transactions by one pool as a whole does not affect the network's resistance to censorship, but the situation requires further monitoring. Mining pools started rejecting transactions from...
  15. Lord777

    Accused of droppery deny their involvement in the REvil hacker group

    Those accused of illegal circulation of payment funds deny their involvement in the REvil hacker group. The defendants were charged with unauthorized copying of information from the databases of the American company HOSTKEY. This was reported to the RAPSI correspondent by lawyer Alexander...
  16. Lord777

    InfectedSlurs botnet en masse Recruits network devices to its DDoS Battalion

    Both simple routers and video surveillance devices are at risk. According to fresh data provided by cybersecurity company Akamai, researchers recently discovered a new botnet based on the legendary Mirai malware. The malicious infrastructure is called "InfectedSlurs". For distribution, it uses...
  17. Lord777

    strongSwan IPsec vulnerability that causes remote code execution

    strongSwan, an IPsec-based VPN package used on Linux, Android, FreeBSD, and macOS, has identified a vulnerability (CVE-2023-41913) that can be used to remotely execute malicious code. The vulnerability is caused by an error in the charon-tkm process with the implementation of the key exchange...
  18. Lord777

    Authorities tighten control over SIM cards

    In Russia, new rules for the turnover of SIM cards may be introduced – in particular, it is proposed not to activate them until the Ministry of Internal Affairs checks the new subscriber. The new measures may complicate the process of connecting to mobile networks for Russian citizens and...
  19. Lord777

    Web shell "HrServ"

    During a recent Kaspersky Lab investigation, researchers discovered a DLL file identified as "hrserv.dll", which is a previously unknown web shell with advanced features, such as special coding methods for communicating with the client and performing operations in memory. Analysis of this...
  20. Lord777

    LummaC2 uses trigonometry to detect sandboxes

    The development of the Lumma stealer (aka LummaC2) advertises a new feature that supposedly allows you to restore outdated Google cookies, which can then be used to hack victims accounts. Session cookies usually have a limited validity period for security reasons to prevent possible abuse if...
Top