Search results

  1. Teacher

    Software supply chain - the main loophole for hackers: 10 main dangers for companies

    The rating shows what you need to pay attention to when planning cyber defense. The European Cybersecurity Agency (ENISA) has updated its cyber threat forecast, highlighting the top 10 threats that will have the greatest impact by 2030. Compromising the software supply chain came first, albeit...
  2. Teacher

    Map of knowledge and skills on secure development

    13 vulnerabilities and technologies that are important for a developer to know in order to produce high-quality products. To produce high-quality products quickly and without vulnerabilities, a company needs developers who have all the necessary information security competencies. They know how...
  3. Teacher

    Microsoft Exchange: The "Achilles heel" of IT infrastructure

    The negligence of system administrators threatens the security of Germany. German authorities have expressed serious concern about the threat of large-scale cyber attacks, which affect about 17,000 (about 37%) of all Microsoft Exchange servers in the country. The Federal Information Security...
  4. Teacher

    RisePro, RedLine, StealC: the most common infostealers of 2024

    How to become a victim of hackers in a couple of clicks. CyberArc experts report that attackers are developing new methods for accessing users personal data that do not require knowledge of passwords or multi-factor authentication requests. One of the most common techniques is to intercept web...
  5. Teacher

    Black Monday in Vietnam: VNDirect cyberattack crashes stock market

    The company is gradually restoring its operations, but it will not be easy to regain the trust of investors. The Vietnamese brokerage market is experiencing serious turmoil after VNDirect, one of the country's largest securities players, was subjected to a large-scale cyber attack. The events...
  6. Teacher

    50% increase: 0day-vulnerabilities are being used by hackers more and more often

    Google researchers have proposed a working strategy to reduce the level of malicious exploitation. A recent report from Google's cyber experts found that the number of zero-day exploits of vulnerabilities increased by 50% in 2023, reaching 97 cases compared to 62 in the previous year. Zero-day...
  7. Teacher

    Operation FlightNight: how Slack helped steal India's state secrets

    Open source software allowed you to steal gigabytes of confidential data. EclecticIQ has discovered a new spying campaign targeting government agencies and India's energy industry. Criminals used a modified version of the open source data theft software HackBrowserData, which is capable of...
  8. Teacher

    Angie 1.5.0: now under the BSD license, compatible with Russian operating systems

    A new version of the high-performance HTTP server has been published. The Angie development team has introduced a new version of a high-performance HTTP server and proxy server that works with multiple protocols. The Angie project is now available under the BSD license and has demonstrated its...
  9. Teacher

    Google Photos as a tool for waging war

    How did the Israeli army adapt the popular media service to its needs? According to The New York Times, Israel's military intelligence is actively using the publicly available Google Photos service in the Gaza Strip as an alternative to the existing professional facial recognition system...
  10. Teacher

    $2.6 billion - the price of cybersecurity: CISA calculates the cost of the new law

    The US authorities should be aware of every attack on hundreds of thousands of companies. The CISA submitted a draft law on mandatory reporting of critical infrastructure organizations on cyber attacks to the government. The proposal has been published for public comment. The law that formed...
  11. Teacher

    Washington announces $10 million reward for information on Chinese hackers

    Chinese hackers APT31, allegedly linked to the Chinese Ministry of State Security (MSS), attacked computer networks, email, and cloud storage of government agencies, companies, and individuals, including critical US infrastructure, American businesses, politicians, and their political parties...
  12. Teacher

    GEOBOX: how to turn Raspberry Pi into a powerful tool for espionage

    A new hacking tool called GEOBOX has appeared on the darknet and is being sold through Telegram and underground forums for $ 700. It allows cybercriminals to hijack Raspberry Pi devices to fake location and bypass detection systems. GEOBOX is able to turn the Raspberry Pi 4 Model B into a...
  13. Teacher

    Investigators of the Achinsk city police of the Krasnoyarsk Territory stopped the theft of 2 million rubles from the businessman's account

    In the Krasnoyarsk Territory, an entrepreneur born in 1985 reported the loss of more than 2 million rubles from a bank account to the Achinsky duty station of the Ministry of Internal Affairs of the Russian Federation. In the course of working on the application, police officers found that a...
  14. Teacher

    The number of cryptocurrency-related court cases in Russia increased by 72%

    In Russia, in 2023, the number of legal disputes related to cryptocurrency increased by 72% compared to 2022 to 2,653, the press service of the Moscow Digital School educational platform in the field of digital and business law reported. "In 2023, the number of legal disputes related to...
  15. Teacher

    Peer-to-peer SMS login to Telegram creates privacy risks

    Telegram, one of the most popular instant messengers in the world, introduced a new feature that caused heated discussions and concerns among users. The company offers a free premium subscription to those who agree to provide their phone number to send one-time SMS passwords to other people when...
  16. Teacher

    In South Korea, two crypto scammers lured a pensioner out of $4 million

    Police in the South Korean city of Busan have detained two men who stole 5.5 billion won ($4.1 million) from a local pensioner with promises of huge profits from investing in digital assets. From September to December 2022, scammers guaranteed the victim a profit of 70% with monthly crypto...
  17. Teacher

    Sold non-existent equipment: cyber police of Dnipropetrovsk region exposed fraudsters

    The cyber police of Dnipropetrovsk region together with the investigators of the regional GUNP under the procedural leadership of the Dnipropetrovsk regional Prosecutor's Office exposed three fraudsters from Kamenskoye, who sold non-existent goods via the Internet. It is established that a...
  18. Teacher

    The alleged organizer of fraud and the courier who deceived the pensioner are detained by the Moscow police

    Employees of the criminal investigation department of the OMVD of Russia in the Khoroshevo-Mnevniki district of Moscow detained two men suspected of embezzling 1.8 million rubles from an 81-year-old resident of the capital by deception. It was previously established that at the end of last...
  19. Teacher

    Vulnerabilities in the Linux kernel that allow you to raise your privileges via nf_tables and ksmbd

    A vulnerability (CVE-2024-1086) has been identified in Netfilter, a subsystem of the Linux kernel used to filter and modify network packets, which allows a local user to execute code at the kernel level and raise their privileges in the system. The problem is caused by double-free memory in the...
  20. Teacher

    Hackers broke into the Decrypt account for phishing mailing about the distribution of tokens

    Cryptocurrency publication Decrypt warned about hacking its account in the electronic mailing service. Attackers sent phishing emails about the distribution of DECRYPT tokens. The editors of Decrypt explained that in fact the portal does not conduct any distribution of tokens. All links sent to...
Top