Search results

  1. Teacher

    The vulnerability of the IFTTT autoposting service led to the hacking of crypto-influencers in X

    On March 21, the accounts of several crypto industry influencers in X were compromised to promote the PACKY scam token. Probably, the hacker got access through the automatic post publishing service IFTTT (If This then That). One of the victims was the adviser Andreessen Horowitz (a16z) Packy...
  2. Teacher

    In the US, they tried to reveal the identity of the creators of the SocksEscort proxy service

    American researchers again showed attention to the popular proxy service SocksEscort. Past attempts to deanonymize its creators ended in nothing, but this time independent information security journalist Brian Krebs managed to move a little further. The formal reason for the investigation was...
  3. Teacher

    Four Dragons Bitcoin exchange from Kyrgyzstan shares details of hacking

    Representatives of the Four Dragons cryptocurrency exchange from Kyrgyzstan, which suffered from hacking at the end of February, revealed to ForkLog some details of the investigation of the incident. According to them, unknown persons stole USDT from the platform's hot wallet at the time of a...
  4. Teacher

    Four residents of the city of Novokuznetsk, Kemerovo region, will appear in court

    A preliminary investigation of a criminal case on fraudulent actions against pensioners has been completed by an investigator of the Main Directorate of the Ministry of Internal Affairs of the Russian Federation for the Krasnoyarsk Territory. Four residents of the city of Novokuznetsk, Kemerovo...
  5. Teacher

    In Voronezh, the police stopped the activities of a group engaged in broadcasting pornography

    Employees of the Criminal Investigation Department of the Ministry of Internal Affairs of Russia in the city of Voronezh, as a result of operational search measures, stopped the activities of a group whose members were engaged in the production and distribution of pornographic materials. With...
  6. Teacher

    Scam with "Pushkin Cards"

    Employees of UEBiPK of the Ministry of Internal Affairs of Russia in the Perm Region together with colleagues from the department of the Ministry of Internal Affairs of Russia "Bardymsky" detained a 29-year-old resident of Barda. He is suspected of embezzling budget funds using the Pushkin Map...
  7. Teacher

    In Moscow, the investigation of a criminal case on illegal banking activities with a turnover of more than 2.5 billion rubles has been completed

    An investigator of the Main Directorate of the Ministry of Internal Affairs of the Russian Federation for Moscow has completed a preliminary investigation of a criminal case on illegal banking activities. Two residents of the capital are accused of committing the crime. "According to...
  8. Teacher

    AWS исправляет критическую ошибку "FlowFixation" в сервисе Airflow для предотвращения перехвата сеанса

    Исследователи кибербезопасности поделились подробностями об исправленной уязвимости в управляемых рабочих процессах Amazon Web Services (AWS) для Apache Airflow (MWAA), которая потенциально может быть использована злоумышленником для перехвата сеансов жертв и удаленного выполнения кода в базовых...
  9. Teacher

    Новые фишинговые атаки StrelaStealer затронули более 100 организаций в ЕС и США

    Исследователи кибербезопасности обнаружили новую волну фишинговых атак, целью которых является постоянно развивающийся похититель информации, известный как StrelaStealer. Кампании затронули более 100 организаций в ЕС и США, сообщили исследователи 42-го подразделения Palo Alto Networks в новом...
  10. Teacher

    GoFetch: Apple hardware cryptographic keys no longer belong to their owners

    Software patches won't save you, and the security of millions of users is a big question. Researchers have discovered a serious vulnerability in the microarchitecture of Apple's M-series chips that allows attackers to extract secret keys from Mac devices, including computers and laptops. The...
  11. Teacher

    MarineMax: there was nothing of value in the hacked systems! Rhysida: Are you sure?

    Treasures of the largest yacht broker turned up at a pirate auction. The hacker group Rhysida claimed responsibility for a cyberattack on MarineMax, one of the world's leaders in the sale of recreational vessels and superyachts. The criminals published some of the stolen data on their website...
  12. Teacher

    Apple vs all: Tech giants demand freedom of payments in the App Store

    Meta, Microsoft, X supported Epic Games in the war with the Apple monopoly. The epic battle between Apple and the biggest tech companies is heating up with renewed vigor. Meta*, Microsoft, X (formerly Twitter) and Match Group have officially entered into a protracted legal dispute between Apple...
  13. Teacher

    Ring of Omnipotence: Wizpr Ring takes AI Interaction to the next level

    To feel the magic, just whisper your wish softly. The South Korean company VTouch introduced a unique device called Wizpr Ring (read "Whisper Ring", from the word "whisper"). This is a smart ring with a microphone, controlled by artificial intelligence. It opens up new horizons for the use of...
  14. Teacher

    Hackers fix BIG-IP vulnerability themselves: fight for exclusive access to infected systems

    High competition forces you to exploit 5 errors at once to gain access to corporate networks. Mandiant report that Chinese hackers UNC5174 exploit vulnerabilities in popular products to distribute malware that can install additional backdoors on compromised Linux hosts. The UNC5174 attacks...
  15. Teacher

    Manifest Confusion: More than 800 "surprise" packages revealed on the npm platform

    Hackers hit developers, expecting to affect the software supply chain. A recent study by JFrog found more than 800 packages in the npm registry that have discrepancies between the information specified in the package itself and their actual contents. Some of them use the Manifest Confusion...
  16. Teacher

    StrelaStealer hits energy, manufacturing, and government Agencies

    Complex obfuscation techniques significantly complicate the detection of malware. A new report by Unit 42 researchers from Palo Alto Networks reports on the identification of a new series of phishing attacks that aim to spread malicious software called StrelaStealer. This threat affects more...
  17. Teacher

    Российские хакеры, возможно, нацелились на украинские телекоммуникационные компании с помощью обновленного вредоносного ПО "AcidPour"

    Вредоносное ПО для удаления данных под названием AcidPour могло быть использовано при атаках на четырех операторов связи в Украине, показывают новые данные SentinelOne. Компания по кибербезопасности также подтвердила связь между вредоносным ПО и AcidRain, связав его с группами угроз, связанными...
  18. Teacher

    Министерство юстиции США подало в суд на Apple из-за монополии и безопасности обмена сообщениями

    Министерство юстиции США (DoJ) вместе с 16 другими генеральными прокурорами штатов и округов в четверг обвинило Apple в незаконном сохранении монополии на смартфоны, тем самым подрывая, среди прочего, безопасность и конфиденциальность пользователей при обмене сообщениями не с iPhone. "Apple...
  19. Teacher

    Массовая кампания Sign1 заражает более 39 000 сайтов WordPress мошенническими перенаправлениями

    Масштабная вредоносная кампания под названием Sign1 за последние шесть месяцев скомпрометировала более 39 000 сайтов WordPress, используя вредоносные инъекции JavaScript для перенаправления пользователей на сайты мошенников. По оценкам, только за последние два месяца самая последняя...
  20. Teacher

    Внедрение средств контроля с нулевым доверием для обеспечения соответствия требованиям

    В ThreatLocker® ноль доверять защиты конечных точек платформы реализует строгую отрицать-по-умолчанию, позволяют за исключением безопасности, чтобы дать организации возможность устанавливать управления на основе политик в своей среде и смягчению бесчисленные кибер-угроз, в том числе нулевых...
Top