Search results

  1. Father

    Dozens of viruses in 2 minutes: what happens to Windows XP if you connect it to the Internet?

    The experiment showed how vulnerable legacy operating systems are. A recent video of popular YouTuber Eric Parker caused a storm of emotions among netizens. Parker clearly demonstrated how dangerous it is to connect old operating systems to the Internet without any protection, including...
  2. Father

    Grandoreiro and 100 MB of fraud: pumped Trojan attacks banks around the world via Outlook

    This time the malware went far beyond Latin America… The hacker group behind the Grandoreiro banking Trojan for Windows has resumed its global campaign since March 2024, following a law enforcement operation to dismantle its infrastructure in January. According to IBM X-Force, large-scale...
  3. Father

    Don't believe everything you read: Trustnet will help you separate truth from lies

    A new browser extension from MIT experts teaches the user critical thinking. MIT introduced the Trustnet browser extension, which allows users to identify misinformation on any website. The tool gives the user the ability to identify what is misinformation and interact with content ratings from...
  4. Father

    GhostStripe: Hackers forced Tesla autopilot to violate traffic rules

    The technique of deception of autonomous car cameras shows a high success rate. A group of scientists from Singapore has developed a way to interfere with the operation of autonomous cars that use computer vision to recognize road signs. The new GhostStripe technique can be dangerous for Tesla...
  5. Father

    How Students Hacked into a Million Washing Machines and Didn't Pay a Dime

    A vulnerability in the CSC ServiceWorks laundry system has raised many questions for the company's security team. Alexander Sherbrooke and Yakov Taranenko, students at the University of California at Santa Cruz, identified a dangerous vulnerability in the laundry payment system of CSC...
  6. Father

    Critical vulnerabilities are not a priority: IT specialists miss the main thing in the fight against cyber threats

    Who are they – the real enemies of modern companies? Conclusions of the new report "Navigating the Paths of Risk: The State of Exposure Management in 2024" by XM Cyber shows that cybersecurity specialists spend too much effort on fixing critical vulnerabilities, ignoring other, even more...
  7. Father

    30 days to notify: SEC tightens control over data leaks

    New rules for protecting customer information for financial institutions. The U.S. Securities and Exchange Commission (SEC) has introduced new rules that require financial institutions to report data leaks within 30 days of their discovery. On May 15, the SEC adopted amendments to the S-P...
  8. Father

    Google ads are a loophole for hackers: Rapid7 doesn't recommend downloading Windows utilities from third-party sites

    Malvertising continues to gain popularity. Cybercriminals have come up with a sophisticated scheme to infect corporate networks with malicious software. They place advertisements in search engines such as Google with links to download popular utilities for Windows. However, victims receive...
  9. Father

    How to make money from logs?

    Good day, my dear future carders 😎 It's already starting to get into the habit of telling you not only about shady professions, but also about how you can cut down "easy money" on the web. And I will not publish methods, a la "Investing 1 ruble - you can raise a billion and build yourself a...
  10. Father

    All about checking cards for validity

    I was inspired to write this text by the phrase “a checker that doesn’t kill CC”, in order to encounter less of this insanity, I decided to chew on this topic and convey: “any checker can ruin CC.” Points considered: 1. How are CC blocked? 2. How are CCs minted? 3. How to check CC? 4. Where can...
  11. Father

    Исходный код INC ransomware продается на хакерских форумах за $ 300 000

    Киберпреступник под ником "salfetka" утверждает, что продает исходный код INC Ransom, программы-вымогателя по принципу "услуга как таковая" (RaaS), запущенной в августе 2023 года. Ранее INC нацеливалась на американское подразделение Xerox Business Solutions (XBS), Yamaha Motor на Филиппинах и...
  12. Father

    Newbie and need legit feedback

    - Any money transfer system works great if you are transferring legitimate money from one account to another. For example, you can use SWIFT. - To obtain bank logs you need to use a stealer. For example, REDLINE or any other. You will receive a login, password and account cookies.
  13. Father

    is this site legit for buying dumps etc?

    This site is a scam. Don't buy anything there - you will be deceived. You can find proven services for selling CC and dumps here: https://carder.market/forums/sell-cc-dumps-checkers-bins.2/
  14. Father

    Students found a bug in the work of the mobile laundry service CSC ServiceWorks, which allows you to wash your clothes for free

    Two research students at the University of California at Santa Cruz, Alexander Sherbrooke and Yakov Taranenko, discovered a vulnerability in the CSC GO Laundry mobile service of the CSC ServiceWorks laundry network, which allows you to use washing machines for free an unlimited number of times...
  15. Father

    Malicious Chrome extension VenomSoftX steals passwords and cryptocurrency

    Experts warn about a malicious extension for Google Chrome called "VenomSoftX". By installing this addon, users run the risk that the contents of their clipboard in Windows will fall into the hands of intruders. In fact, VenomSoftX is one of the components of a malicious program for...
  16. Father

    The Ministry of Internal Affairs "protects" the pocket crypto exchange drugs OG

    Once popular "pocket" banks are now being actively replaced by the same "pocket" crypto-exchangers. The City is full of them, and some of them have very interesting founders and approaches to doing business. Of course, each such exchange has its own "roof", and it's high time to deal with all...
  17. Father

    In the US, two Chinese citizens were arrested for defrauding crypto investors for $73 million

    The US Department of Justice announced the arrest of two Chinese citizens accused of laundering $73 million and leading a group of cryptocurrency scammers. Fraudsters converted the funds received from their victims into USDT stablecoins, American justice says. Daren Lee was detained on April...
  18. Father

    Binance found 13.4 million accounts abusing spam transactions in BNB Chain

    Cybersecurity experts of the largest cryptocurrency exchange Binance have developed an algorithm that allows you to determine the addresses used in fraud with so-called spam transactions. The identified accounts are included in the Web3 partner company's HashDit database. The algorithm was used...
  19. Father

    Банковский троян Grandoreiro вновь появляется, нацеленный на более чем 1500 банков по всему миру

    Злоумышленники, стоящие за банковским трояном Grandoreiro под управлением Windows, возобновили глобальную кампанию с марта 2024 года после устранения правоохранительными органами в январе. Масштабные фишинговые атаки, которым, вероятно, содействуют другие киберпреступники по модели "вредоносное...
  20. Father

    Граждане Китая арестованы за отмывание 73 миллионов долларов при крипто-афере с разделкой свиней

    Министерство юстиции США (DoJ) предъявило обвинения двум арестованным гражданам Китая в предполагаемой организации аферы с забоем свиней, в результате которой жертвы отмыли по меньшей мере 73 миллиона долларов через подставные компании. Эти лица, 41-летний Дарен Ли и 38-летний Ичэн Чжан, были...
Top