Search results

  1. Carding 4 Carders

    Bluetooth-LE-Spam Turns an Android Smartphone into a Spam Machine

    You don't need to buy Flipper Zero to get bombarded with notifications. There is a new shock in the world of cybersecurity: an application has been released that allows you to conduct spam attacks via Bluetooth, similar to those that were previously successfully implemented through the Flipper...
  2. Carding 4 Carders

    US introduces International Ransom Waiver for extortionists

    48 countries announced tougher measures against ransomware programs. The United States, together with a group of 48 countries, the European Union and Interpol, as part of the International Counter Ransomware Initiative (CRI), announced that they will refuse to pay ransoms in the event of cyber...
  3. Carding 4 Carders

    The Lucy spacecraft is preparing for its first encounter with an asteroid

    How will the acquaintance of space travelers end? On Wednesday, the Lucy spacecraft will approach the small asteroid Dinkinesh at a distance of 425 km. Just over two years have passed since the launch of the Lucy mission on the Atlas V rocket, which headed for asteroids in the same orbit as...
  4. Carding 4 Carders

    Online dating can turn into Hamas espionage for Arabs

    Arid Viper's spy software hides behind a mask of love. The hacker group Arid Viper (APT-C-23, Desert Falcon, TAG-63) launched a spy campaign using a fake dating app for Android devices aimed at Arabic-speaking users. According to Cisco Talos, the malware is able to discreetly collect...
  5. Carding 4 Carders

    Chinese social networks are preparing to deprive popular bloggers of anonymity

    Bloggers with more than 500 thousand subscribers will have to indicate their real names. China's largest social media platforms have launched an initiative that requires bloggers with an audience of over 500,000 subscribers to provide their real names. The main focus is on those who publish...
  6. Carding 4 Carders

    Atlassian warned about possible loss of user data

    And called for updating the firmware to avoid this. Atlassian has warned about a critical vulnerability in Confluence Data Center and Server products that allows an unauthorized attacker to gain access to data. The incorrect authorization vulnerability CVE-2023-22518 (CVSS: 9.1) affects all...
  7. Carding 4 Carders

    Where is Manticore hiding? In digital networks of Middle Eastern organizations.

    The Scarred Manticore group operating in the interests of Iran has significantly improved its methods. Check Point specialists, in collaboration with the Sygnia released information about the activities of an Iranian cybercriminal group called Scarred Manticore. It is noted that the group...
  8. Carding 4 Carders

    From NuGet — to the heart of your system: libraries with a surprise appeared on the shelves of the repository

    There is a multi-faceted Trojan hidden in the margins and characters. How do I detect it? Cybersecurity experts have discovered another campaign targeting users of the NuGet repository. As researchers from ReversingLabs found out, it is being conducted from August 1, 2023. Attackers publish...
  9. Carding 4 Carders

    F. A. C. C. T. warns: homoglyph attacks increased 11-fold

    Cybercriminals have become more likely to use spoofed letters in malicious emails. F. A. C. C. T. reports a sharp increase in attempts to circumvent anti-spam solutions using homoglyphs. Homoglyphs are graphically identical or similar characters in malicious mailings. According to the company...
  10. Carding 4 Carders

    Update soon: the security flaw in BIG-IP is actively used in real attacks

    The protection of corporate systems is entirely in the hands of administrators. F5 has reported on the active exploitation of a critical vulnerability in BIG-IP systems, which we discussed at the end of last week. This breach was designated CVE-2023-46747 and has a critical risk level of 9.8 on...
  11. Carding 4 Carders

    The first plasma ignited in the world's largest fusion reactor

    A look at the technologies of the future today. Last week, the world's newest and largest fusion reactor, the JT-60SA, was launched in Japan. This reactor uses magnetic fields from superconducting coils to trap ionized gas in a doughnut-shaped vacuum chamber, in order to stimulate the fusion of...
  12. Carding 4 Carders

    Cybercriminals vs Cybercriminals: Why Hackers attack each other

    The HP Wolf Security report reveals details of an interesting fraudulent operation. HP Wolf Security discovered a unique case of fraud in the cybercrime industry. In the course of monitoring the dark corners of the Internet for their quarterly report, experts identified fake malware developed...
  13. Carding 4 Carders

    Malvertising on the example of PyCharm: how contextual advertising deceives Python developers

    The owner of a wedding firm unwittingly became an accomplice of cybercriminals. A new malvertising campaign has been discovered that promotes infected versions of PyCharm through the Google search engine. Attackers have embedded malicious code into the website of an anonymous wedding planning...
  14. Carding 4 Carders

    Indian politicians have claimed cyber attacks on their smartphones

    At least eight well-known opposition figures were among the victims. In India, several opposition politicians reported attempts to hack their Apple smartphones. This is reported by TASS . According to the report, Shashi Tharoor, a representative of the Indian National Congress, was among the...
  15. Carding 4 Carders

    DeepMind introduces a new version of AlphaFold, which can speed up the process of creating medicines

    How artificial intelligence helps create the medicine of the future. Almost five years ago, Google's DeepMind research lab introduced AlphaFold — an artificial intelligence system capable of predicting protein structures in the human body. In 2020, an improved version was released — AlphaFold...
  16. Carding 4 Carders

    The Amadey Trojan as an Undercover Agent PDF

    A harmless PDF can take control of your data. Cybersecurity experts from the 360 Threat Intelligence Center team have discovered a new campaign by the APT-C-36 group, known for its targeted phishing attacks. This time, cybercriminals decided to step up their attacks by introducing the Amadey...
  17. Carding 4 Carders

    How Yandex Music protects children from harmful content and what it does with tracks that the authorities don't like

    The service has published its first transparency report. Yandex Music has published its first transparency report, which explains how content appears on the platform, why it can be removed, and presents the results of its work on analyzing and labeling 18+content. The report states that Yandex...
  18. Carding 4 Carders

    Literary attack: readers of the British Library are enlightened offline due to a cyber incident

    A book is a person's best friend, but hackers don't agree with that. The British Library faced a critical failure in the operation of its systems due to a mysterious cyber incident that occurred on Saturday, October 28. The problems affected not only the website, but also many other services...
  19. Carding 4 Carders

    New cyber threat threatens Chinese government agencies with data theft

    Hackers use several types of attacks for each individual case. In recent months, the Chinese information space has seen an increase in the activity of cyber attacks aimed at critical infrastructure facilities. One of the most disturbing phenomena was the discovery by experts from the Fuying Lab...
  20. Carding 4 Carders

    Money Message: A hidden guest in corporate networks in Australia

    Finance, accounting, and reports are sent to hackers and then securely encrypted. In August 2023, the Sophos was brought in to support an organization in Australia infected with the Money Message ransomware. This attack vector, known for its stealth, does not add any extensions to encrypted...
Top