Группа криптоджекеров, известная как Kinsing, продемонстрировала свою способность к постоянному развитию и адаптации, оказавшись постоянной угрозой, быстро интегрируя недавно обнаруженные уязвимости для использования арсенала и расширения своей ботнета.
Выводы получены от компании по облачной...
Criminals have been hacking the websites of online stores for several years.
The Investigative Department of the Russian Interior Ministry has completed a preliminary investigation of a criminal case against a group of hackers who for several years hacked the websites of online stores and stole...
5 people created an international system for siphoning money from US corporations.
The US Department of Justice has filed charges against five people for cyber crimes aimed at financing North Korea's nuclear program.
From October 2020 to October 2023, the defendants participated in a campaign...
Critical infrastructure organizations need to change their network protection.
The National Cybersecurity Center of Norway (NCSC) strongly advises organizations to replace SSL VPN/WebVPN with more secure alternatives due to frequent cases of exploiting vulnerabilities in network devices. This...
The browser has finally received a native version for the promising platform from Microsoft.
Opera has introduced a native version of its iconic Windows browser on ARM, marking a significant step in the browser industry for this offshoot of the Redmond operating system.
As a niche player in...
Another promising security tool that Google introduced at the I/O event.
At the last Google I/O conference for developers, the head of DeepMind, Demis Hassabis, presented many new tools based on artificial intelligence, including the Veo video generator, search engine updates and the upgraded...
Why do the police justify buying unsafe drones from China?
The U.S. Congress has expressed concern over plans by the NYPD to use Chinese drones in five high-crime areas. The government's concerns were voiced by NYPD Deputy Operations Commissioner Kaz Daughtry at a House of Representatives...
CISA requires urgent action to protect critical infrastructure.
The CISA added two new vulnerabilities of D-Link routers to its KEV catalog based on evidence of their active use.
CSRF vulnerability CVE-2014-100005 affects D-Link DIR-600 routers and allows an attacker to change router...
What do cybercriminals plan to do with the information they receive?
Security researchers at Proofpoint have discovered that a hacker group allegedly operating in the interests of China is using a new version of the SugarGh0st RAT malware to steal information from artificial intelligence...
The complexity and targeting of attacks has increased compared to 2023.
Kaspersky ICS CERT experts analyzed the dynamics of cyber attacks on industrial systems in the first quarter of 2024. According to their data, the share of Russian computers of automated control systems (ACS) on which...
Why is the combination "1004" so popular in South Korea? The secret is revealed.
In the modern world, the importance of the PIN code is difficult to overestimate. It allows you to instantly access your bank account, withdraw or deposit money. However, for hackers and thieves, this is one of the...
How North Korea finances itself by stealing cryptocurrencies.
In March, North Korea laundered $147.5 million stolen from the HTX cryptocurrency exchange in 2023 through the Tornado Cash cryptomixer. This is reported by Reuters, referring to confidential documents monitoring UN sanctions...
South Korean government networks have tested the power of the Trojan.
Cybersecurity company Symantec identified a new tool of the North Korean group Kimsuki, which is used to attack government and commercial organizations in South Korea.
The new malware is called Gomir and is a Linux version...
Originating as an evolution of Waterbear, the new Trojan has more specific goals…
Cybersecurity researchers have revealed new details about a remote access Trojan called Deuterbear RAT, which is being used by China-linked hacker group BlackTech as part of a cyber-espionage campaign targeting...
The largest manufacturer of agricultural machinery is concerned about the safety of customers and employees.
On May 11, a large-scale hacker attack occurred on the manufacturer of agricultural machinery Lemken. The operation covered all international branches of the company. In order to protect...
The corporation has found a clever way to stifle competitors by circumventing the laws.
Apple has restricted the development and support of third-party browser engines for the European Union after the forced adoption of a new DMA law allowing the use of alternative browser engines on iOS...
Solar 4RAYS has revealed details of the Obstruct Mogwai attack on a telecom company.
In 2023, the Solar 4RAYS team investigated an attack on a Russian telecommunications company organized by the Asian APT group Obstinate Mogwai. Hackers have repeatedly exploited the deserialization...
How to create a cryptocurrency. Step-by-step instructions
Disclaimer: Don't repeat it at home. This article is designed to teach you how to quickly recognize cryptoscams, knowing how they work from the inside out.
Pour water on someone who wants to make Cryptoscam... and set it on fire... But...
Content:
Phishing and scam history
Phishing and scam: current types of fraud
Phishing
Scam
Distribution
Instant Messengers
Social network
Marketplaces
Malicious methods: what phishing and scam consist of
Spoofing
Hacking websites
Using the functionality of legitimate services
Protection...
In today's digital world, where the Internet has become an integral part of our daily lives, scams and scams have become serious threats to our security and finances. Every day there are new methods and tactics used by scammers to deceive us and gain access to our personal data or financial...