Search results

  1. CarderPlanet

    Scammers use bugs in the GoDaddy policy to buy domain names at auctions for a song

    Domain Gang experts found out that scammers use the imperfection of the GoDaddy registrar's policy to acquire domain names at auctions for a song, in fact, by collusion and deception. An investigation by network specialists has shown that the auctions of many long and short domain names, the...
  2. CarderPlanet

    Китайские хакеры нанесли удар по полупроводниковым фирмам в Восточной Азии с помощью Cobalt Strike

    Были замечены злоумышленники, нацеленные на полупроводниковые компании в Восточной Азии с приманками, маскирующимися под Taiwan Semiconductor Manufacturing Company (TSMC), которые предназначены для доставки маяков Cobalt Strike. Набор для вторжения, согласно EclecticIQ, использует бэкдор под...
  3. CarderPlanet

    Северокорейская Lazarus Group отмыла 900 миллионов долларов в криптовалюте

    В результате перекрестных преступлений было незаконно отмыто до 7 миллиардов долларов в криптовалюте, причем связанная с Северной Кореей Lazarus Group причастна к краже примерно 900 миллионов долларов из этих доходов в период с июля 2022 по июль этого года. "Поскольку традиционные организации...
  4. CarderPlanet

    Supply chain attacks are becoming mainstream. How to secure your product and organization.

    Trend Micro researchers detailed methods for compromising trusted repositories. One of the most worrying trends in recent years has been the increase in attacks on software supply chains, especially those that affect code repositories. According to a report by the European Cybersecurity Agency...
  5. CarderPlanet

    Next-generation tracker: how a URL communicates your data to marketers

    73% of the site uses a little trick to make big money on users. Adding parameters to URLs, a technique for adding data to the end of web links, has become a major issue for user data privacy. This method is used to transmit data, including email addresses, to advertising companies to track user...
  6. CarderPlanet

    Apple's plans to change the search engine in iOS: a tactical bluff or a threat to Google's monopoly?

    Will DuckDuckGo and Bing compete with the global giant? It became known that Apple has already thought about introducing new search engines into its devices several times. At least that's what a few corporations claim. Despite the fact that the company has been working with Google for quite...
  7. CarderPlanet

    Linuxoids are tense: an exploit for Looney Tunables is already walking around the network

    A new way to compromise the popular OS is now available to every hacker. Before we could tell you about the "Looney Tunables" vulnerability, which is tracked under the identifier CVE-2023-4911 , a PoC exploit has already appeared on the Internet, which allows you to successfully exploit this...
  8. CarderPlanet

    Where did life come from? What secrets do molecules hide?

    "Assembly Theory" will answer all your questions. An international team of scientists has developed a new theoretical concept that combines physics and biology, providing a unified approach to understanding how complexity and evolution arise in nature. The Assembly Theory study was published on...
  9. CarderPlanet

    Cortana's Death: Microsoft Removes Failed Assistant from Insider Builds

    Users will not be left without an alternative — AI has already made adjustments to the process of interacting with the OS. In the latest insider release of Windows 11 under build number 25967, Microsoft finally removed the Cortana app from its operating system. "After updating to this build...
  10. CarderPlanet

    Unknown hackers "froze" court proceedings across Florida

    Authorities are investigating the incident and looking for ways to restore systems as soon as possible. The judicial district of the state of Florida faced a cyberattack, because of which its work was suspended. On the official website of the agency, it was confirmed that an "information...
  11. CarderPlanet

    The law of cyberboomerang: the Lorenz ransomware group was the victim of its own leak

    The data of everyone who tried to contact hackers for 2 years was made publicly available. The Lorenz ransomware group inadvertently exposed the data of all the people who tried to contact it via an online form on a dark site over the past two years. This data includes names, email addresses...
  12. CarderPlanet

    Oospy spyware will no longer disturb Android users

    Changing the name didn't help the Spyhide app evade the law. The spy app called Oospy has stopped working. It appeared in the middle of this year after the disclosure of its predecessor, the Spyhide program, which secretly monitored tens of thousands of Android users around the world. When the...
  13. CarderPlanet

    How Cement Can Light Up Your Home and Charge Your Electric Car

    MIT researchers have turned ancient material into a source of power. Researchers at the Massachusetts Institute of Technology (MIT) have created an innovative supercapacitor using cement, soot and water. This device has the potential to provide an affordable and scalable solution for storing...
  14. CarderPlanet

    What can DNA tests tell hackers about you?

    An unknown person stole "the most valuable data that you can imagine". On one of the popular hacker forums, an unknown person announced that he had taken possession of "the most valuable data that you can imagine." To his post, he attached a link to some of the materials allegedly stolen from...
  15. CarderPlanet

    0-day exploits for popular apps have risen in price by millions of dollars. What is the reason?

    Who is willing to pay $8 million for your WhatsApp messages? According to recent research, the cost of zero-day exploits for popular instant messengers today is measured in millions of dollars. One of the main reasons is the evolution of security mechanisms in mobile operating systems. The...
  16. CarderPlanet

    Прошивка BMC от Supermicro обнаружена уязвимой к множеству критических уязвимостей

    Во встроенном ПО Intelligent Platform Management Interface (IPMI) для контроллеров управления базовой платой Supermicro (BMCS) было обнаружено множество уязвимостей в системе безопасности, которые могут привести к повышению привилегий и выполнению вредоносного кода в затронутых системах...
  17. CarderPlanet

    Функция секретного сканирования GitHub теперь распространяется на AWS, Microsoft, Google и Slack

    GitHub объявила об улучшении своей функции секретного сканирования, которая расширяет возможности проверки достоверности для популярных сервисов, таких как Amazon Web Services (AWS), Microsoft, Google и Slack. Проверки достоверности, введенные дочерней компанией Microsoft ранее в этом году...
  18. CarderPlanet

    Новое средство операционной системы сообщает вам, у кого есть доступ к каким данным

    Первостепенное значение имеет обеспечение конфиденциальности конфиденциальных данных, их защиты от несанкционированного доступа и соблюдения правил конфиденциальности данных. Утечка данных наносит финансовый ущерб и ущерб репутации, а также влечет за собой юридические последствия. Поэтому...
  19. CarderPlanet

    AI threats at the state level: how could deepfakes influence the Slovak elections

    "Colossal stupidity" or a new tool of political struggle? On the eve of the parliamentary elections in Slovakia, which took place on September 30, 2023, audio recordings of allegedly private conversations of Slovak politicians were distributed on the Internet. The fact that these materials were...
  20. CarderPlanet

    TSMC unwittingly became an accomplice of espionage against chip manufacturers

    What do hackers want to know and how will they use the stolen information? EclecticIQ specialists have discovered a new spying campaign targeting Chinese manufacturers of semiconductor products, which uses decoy documents associated with TSMC to infect victims with Cobalt Strike beacons. The...
Top