Search results

  1. Teacher

    MuddyWater changes tactics: legitimate software instead of malware

    File sharing sites are becoming a new attack vector on Israeli companies. The information security company Proofpoint has discovered a new phishing campaign of the Iranian group MuddyWater, during which legitimate software for remote monitoring and management of Atera is distributed among...
  2. Teacher

    Discord tokens in hot demand: hacking Top.gg turned into a nightmare for developers

    How many users were affected by Discord's supply chain compromise? Popular service Top.gg, which helps users find servers and bots for Discord, was hit by a supply chain attack. Attackers injected malicious code into Python packages used by bot developers. The purpose of the attack, apparently...
  3. Teacher

    Syroezhki or wake: excessive trust in AI almost killed many Americans

    The dark side of progress or why it's so important to develop critical thinking. A recent report by Public Citizen, a non-governmental consumer protection organization, raises a worrying question about the growing popularity of wild mushroom picking and the associated risks, compounded by...
  4. Teacher

    Hackers palera1n hacked impregnable Apple TV

    Jailbreak allows access to third-party apps and features for the first generation of devices. The hacker team palera1n announced the release of a jailbreak for Apple TV set-top boxes. So far, the hacked firmware is only compatible with first-generation Apple TV HD and Apple TV 4K devices, but...
  5. Teacher

    US and UK accuse China of political espionage

    Washington announced a $10 million reward for information about Chinese hackers. Chinese hackers APT31, allegedly linked to the Chinese Ministry of State Security (MSS), attacked computer networks, email, and cloud storage of government agencies, companies, and individuals, including critical...
  6. Teacher

    Tycoon 2FA: Two-factor authentication in your email won't help anymore

    Attackers are hacking Microsoft 365 and Gmail accounts using a new phishing platform. Cybercriminals are increasingly using the new phishing platform Tycoon 2FA to hack into Microsoft 365 and Gmail accounts, while bypassing two-factor authentication. This trend was revealed by experts from...
  7. Teacher

    Hackers vs Donuts: Panera Bread teaches you to value live communication... with the cashier

    Due to a "glitch" in the popular bakery chain, it is now possible to have lunch only for cash. On March 23, the popular American bakery chain Panera Bread faced serious outages that affected the company's IT systems across the country. Violations affected online order systems, cash registers...
  8. Teacher

    Phantom hackers with a Ukrainian footprint: PhantomCore attacks Russia

    Traces of the group's unique Trojan lead to Kiev. Experts from the Threat Intelligence department of F. A. C. C. T. have identified a new hacker group called PhantomCore. Since January 2024, this group has been actively attacking Russian companies using the unique, previously unknown remote...
  9. Teacher

    GEOBOX: how to turn Raspberry Pi into a powerful tool for espionage

    A miniature computer opens up new horizons in the activities of cybercriminals. A new hacking tool called GEOBOX has appeared on the darknet and is being sold through Telegram and underground forums for $ 700. It allows cybercriminals to hijack Raspberry Pi devices to fake location and bypass...
  10. Teacher

    Trade union may permanently lose data of 185,000 Britons due to cyber attack

    The incident shows the importance of rapid response and compliance with cybersecurity measures. The Communications Workers Union (CWU) was the victim of a cyberattack that caused IT systems to shut down. The incident was reported by a representative of the organization to The Register. The CWU...
  11. Teacher

    Ten-million fine for spam: the American fraudster faced a tough court decision

    Will the life of a phone bully be enough to pay off a debt to the state? A U.S. federal court has imposed a $ 9,918,000 fine and issued an activity ban to an individual named Scott Rhodes for making thousands of fake automated robocalls to residents of the United States. Robocalls are...
  12. Teacher

    Google, Apple, Meta and Amazon may lose 10% of turnover: EC threatens fines for DMA violation

    IT giants vs. EC: Who will win the battle for justice in digital markets? The European Commission has announced the launch of investigations against the largest technology companies — Alphabet (the parent company of Google), Apple, Meta* and Amazon-on suspicion of violating the Digital Markets...
  13. Teacher

    Scammers who acted under the scheme "A friend asks for a loan" will be tried in the Carpathian region

    The cyber police of the Ivano-Frankivsk region stopped the activities of a group of individuals who hacked the accounts of users of a popular social network and sent messages on their behalf asking them to borrow money: more than a million hryvnias of cash were seized from them. Law enforcement...
  14. Teacher

    Trusting DHCP is your worst mistake: an innocent protocol substitutes admins

    Criminals are thinking about how else to increase privileges on Windows systems. Experts have discovered a sophisticated method of privilege escalation in Windows domain environments. This unique hacking technique, called DHCP Coerce, allows hackers to use legitimate rights to gain full control...
  15. Teacher

    Magnetic vortices are the key to creating ultra-fast and energy-efficient computers

    A new "bit switch" could change the future of AI. A team of scientists from Singapore has created a microelectronic device that can potentially function as a high-performance and eco-friendly "bit switch", paving the way for future computer technologies that can process data much faster with...
  16. Teacher

    Farewell to Intel, AMD and Windows: China chooses its own path

    China's state structures: why do we need Western technologies if we have our own? China is gradually abandoning the use of Intel and AMD chips, the Windows operating system, and foreign databases in favor of domestic alternatives. The requirements mainly relate to computers and servers owned by...
  17. Teacher

    Scammers used new methods of deception in the East, earning $100 million

    During Ramadan, Resecurity recorded a significant increase in the number of fraudulent activities and scams, coinciding with an increase in retail and online transactions. Cybercriminals are particularly active in the Middle East, especially in the Kingdom of Saudi Arabia, where consumer...
  18. Teacher

    ParaSwap will return funds to users after the vulnerability is detected

    The aggregator of liquidity from decentralized exchanges ParaSwap began to return cryptocurrency to users after fixing a critical vulnerability in the recently launched Augustus v6 smart contract. According to the platform, 213 addresses have not yet revoked their permissions. On March 20...
  19. Teacher

    EU bans anonymous transactions from custodial wallets

    The European Parliament has approved a new law on combating money laundering, which also prohibits anonymous transactions from custodial wallets. This was stated by MEP Patrick Breyer. According to him, the ban applies to: cash payments of more than €10,000; anonymous cash payments of more...
  20. Teacher

    An illegal cryptocurrency trader, whose illegal turnover exceeded 200 thousand rubles, was identified in Minsk

    In the capital, an illegal cryptocurrency trader was identified, whose illegal turnover exceeded 200 thousand rubles Cybercrime counteraction operatives of the Central Police Department of the capital identified a 28-year-old Minsk resident who was engaged in illegal cryptocurrency trafficking...
Top