Search results

  1. Carding

    Украинский хакер подозревается в атаке вредоносного ПО "Free Download Manager"

    Разработчики Free Download Manager (FDM) признали факт инцидента безопасности, произошедшего в 2020 году, который привел к тому, что его веб-сайт использовался для распространения вредоносного программного обеспечения Linux. "Похоже, что определенная веб-страница на нашем сайте была...
  2. Carding

    Кибергруппа "Золотая мелодия" продает взломанный доступ злоумышленникам-вымогателям

    Финансово мотивированный участник угрозы был раскрыт в качестве посредника первоначального доступа (IAB), который продает доступ к скомпрометированным организациям другим злоумышленникам для проведения последующих атак, таких как программы-вымогатели. Компании Secureworks противодействия угрозе...
  3. Carding

    Китай обвиняет США в десятилетней кампании кибершпионажа против серверов Huawei

    Министерство государственной безопасности Китая (MSS) обвинило США во взломе серверов Huawei, краже критически важных данных и внедрении бэкдоров с 2009 года на фоне растущей геополитической напряженности между двумя странами. В сообщении, размещенном в WeChat, правительственные власти заявили...
  4. Carding

    Распространение вредоносного приложения

    Службы безопасности знакомы с угрозами, исходящими от сторонних приложений, которые сотрудники добавляют для повышения своей производительности. Эти приложения изначально предназначены для предоставления пользователям функциональных возможностей путем подключения к приложению-концентратору...
  5. Carding

    Исследователи предупреждают о вредоносном ПО P2PInfect с 600-кратным увеличением активности

    Одноранговый червь (P2), известный как P2PInfect, стал свидетелем всплеска активности с конца августа 2023 года, а с 12 по 19 сентября 2023 года - скачка в 600 раз. "Это увеличение трафика P2PInfect совпало с ростом числа вариантов, встречающихся в дикой природе, что говорит о том, что...
  6. Carding

    Confidential ICC data at risk after hacker attack

    What are the consequences of a cyberattack on the global justice system? The International Criminal Court (ICC) said on Tuesday that its computer system was hacked. The security breach occurred at one of the most prominent international organizations that handles confidential information about...
  7. Carding

    PT Sandbox and Continent 4: A double whammy on Cyber Threats

    Positive Technologies and Security Code strengthen customer protection. The PT Sandbox and the next-generation firewall "Continent 4" from the Security Code company have passed technological compatibility tests. Both products are designed to provide layered protection against cyber threats...
  8. Carding

    Didn't get paid? And in vain: the new Venomrat virus threatens WinRAR users.

    A hacker's bad joke can turn into a problem for more than 500 million WinRAR users. According to a study by Palo Alto Networks, a cybercriminal known as "whalersplonk" took advantage of the Remote Code Execution (RCE) vulnerability in WinRAR (CVE-2023-40477), which was made public in August...
  9. Carding

    Family Contract: how the couple cheated thousands of companies out of $88 million

    The couple pleaded guilty to organizing a large scheme to defraud Avaya dealers. The system administrator and his wife confessed to organizing a group that sold $88 million worth of Avaya software licenses at low prices. Brad and Dusty Pierce have admitted conspiracy to commit communications...
  10. Carding

    Rat Race: Unknown hackers infect companies with Trojans in China

    Massive cyber attacks have put Chinese businesses in the hands of hackers. Cybersecurity company Proofpoint reports that Chinese companies on the mainland have been targeted by cybercriminals, many of whom use new types of malware. Analysts said that in 2023, about 30 such campaigns were...
  11. Carding

    NPM packages have become paid: now you need to pay with SSH keys and data

    Under the guise of trusted libraries, attackers try to attack software supply chains. Sonatype cybersecurity researchers have discovered a batch of malicious packages in the npm registry designed to extract Kubernetes configurations and SSH keys from infected machines to a remote server...
  12. Carding

    Signal prepared in advance: messenger is no longer afraid of quantum computers

    New encryption algorithms set new security standards. Messenger Signal has announced changes to the Signal protocol to add support for quantum stability. To do this, the Extended Triple Diffie-Hellman (X3DH) specification has been upgraded to Post-Quantum Extended Diffie-Hellman (PQXDH)...
  13. Carding

    A patch from Trend Micro or how to prevent hackers from getting into the heart of the admin console

    Apex One and Worry-Free products are safe, but what about other developers software? Trend Micro released a patch to address a critical vulnerability in the Apex One and Worry-Free Business Security products for Windows. We are talking about CVE-2023-41179, which is already used in real cyber...
  14. Carding

    IT irony: India's Silicon Valley is mired in cybercrime

    The country's largest technology centers have pulled the "blanket of hacker attacks" over themselves. Cybercrime in India has been on the rise for three and a half years, according to a recent report from the Future Cybercrime Research Foundation (FCRF). A detailed analysis showed that the...
  15. Carding

    Finnish authorities have eliminated the PIILOPUOTI darknet drug market

    Finnish customs decided to show who is in charge here on the Internet. Finnish law enforcement agencies have announced the elimination of PIILOPUOTI, a shadowy online marketplace specializing in the illegal drug trade, since May 2022. The site functioned as a hidden service on the encrypted...
  16. Carding

    Gold Melody Group sells initial access to cybercriminals of all stripes

    For every hacked company, there is bound to be a buyer. The financially motivated Gold Melody group was recently identified as an initial access broker (IAB) that sells third-party cybercriminals access to compromised organizations for subsequent attacks. The pseudonym "Gold Melody" was...
  17. Carding

    A single reporting portal for cyber incidents — a panacea or a headache for business?

    The United States plans to adopt new standards in the field of cyber reporting. The US Department of Homeland Security (DHS) has proposed to simplify the rules for federal reporting on cyber incidents for affected organizations, including by creating a single web portal for such reports...
  18. Carding

    What are you up to, P2PInfect? Updated botnet activity is gaining momentum.

    Why does the worm install mining programs on your devices and leave them for later? Since August 2023, researchers have recorded a sharp increase in the activity of the P2PInfect worm. This malicious code, which is distributed on a peer-to-peer basis, was first discovered by experts from Unit...
  19. Carding

    Vulnerabilities in Juniper, ASUS, D-Link, Tenda, and NETGEAR network devices

    Several dangerous vulnerabilities in network devices that allow you to execute your own code or gain control access without passing authentication: A vulnerability (CVE-2023-36845) has been identified in Juniper SRX series firewalls and Juniper EX series switches built on the basis of Junos OS...
  20. Carding

    Greater Manchester Police has fallen victim to a ransomware attack and a data leak

    British law enforcement officials reported that they were the victim of a ransomware attack that hit an unnamed third-party vendor. As a result, the leak affected the personal information of a number of employees. Last month, the London Police faced a similar problem. According to a statement...
Top