Search results

  1. Father

    Хакерская группа Kinsing использует больше недостатков, чтобы расширить ботнет для криптоджекинга

    Группа криптоджекеров, известная как Kinsing, продемонстрировала свою способность к постоянному развитию и адаптации, оказавшись постоянной угрозой, быстро интегрируя недавно обнаруженные уязвимости для использования арсенала и расширения своей ботнета. Выводы получены от компании по облачной...
  2. Father

    In Ryazan hackers will appear in court for theft of data of 159 thousand cards

    Criminals have been hacking the websites of online stores for several years. The Investigative Department of the Russian Interior Ministry has completed a preliminary investigation of a criminal case against a group of hackers who for several years hacked the websites of online stores and stole...
  3. Father

    97.5 years in prison: how US IT specialists funded North Korea's nuclear program

    5 people created an international system for siphoning money from US corporations. The US Department of Justice has filed charges against five people for cyber crimes aimed at financing North Korea's nuclear program. From October 2020 to October 2023, the defendants participated in a campaign...
  4. Father

    From SSLVPN to IPsec: Norway calls for abandoning the protocol in favor of security

    Critical infrastructure organizations need to change their network protection. The National Cybersecurity Center of Norway (NCSC) strongly advises organizations to replace SSL VPN/WebVPN with more secure alternatives due to frequent cases of exploiting vulnerabilities in network devices. This...
  5. Father

    Opera breaks into the world of portable Windows on ARM with two legs

    The browser has finally received a native version for the promising platform from Microsoft. Opera has introduced a native version of its iconic Windows browser on ARM, marking a significant step in the browser industry for this offshoot of the Redmond operating system. As a niche player in...
  6. Father

    SynthID vs fakes: Updated digital tagging system will prevent AI from deceiving you

    Another promising security tool that Google introduced at the I/O event. At the last Google I/O conference for developers, the head of DeepMind, Demis Hassabis, presented many new tools based on artificial intelligence, including the Veo video generator, search engine updates and the upgraded...
  7. Father

    Saving Money for Espionage: NYPD will use Chinese drones against criminals

    Why do the police justify buying unsafe drones from China? The U.S. Congress has expressed concern over plans by the NYPD to use Chinese drones in five high-crime areas. The government's concerns were voiced by NYPD Deputy Operations Commissioner Kaz Daughtry at a House of Representatives...
  8. Father

    Password theft and change of settings: new D-Link bugs found in the CISA catalog

    CISA requires urgent action to protect critical infrastructure. The CISA added two new vulnerabilities of D-Link routers to its KEV catalog based on evidence of their active use. CSRF vulnerability CVE-2014-100005 affects D-Link DIR-600 routers and allows an attacker to change router...
  9. Father

    Chinese hackers steal AI secrets from leading companies in the industry

    What do cybercriminals plan to do with the information they receive? Security researchers at Proofpoint have discovered that a hacker group allegedly operating in the interests of China is using a new version of the SugarGh0st RAT malware to steal information from artificial intelligence...
  10. Father

    Kaspersky talked about the dynamics of threats to industry in the first quarter of 2024

    The complexity and targeting of attacks has increased compared to 2023. Kaspersky ICS CERT experts analyzed the dynamics of cyber attacks on industrial systems in the first quarter of 2024. According to their data, the share of Russian computers of automated control systems (ACS) on which...
  11. Father

    The most common four-digit PIN codes that can undermine your security are named

    Why is the combination "1004" so popular in South Korea? The secret is revealed. In the modern world, the importance of the PIN code is difficult to overestimate. It allows you to instantly access your bank account, withdraw or deposit money. However, for hackers and thieves, this is one of the...
  12. Father

    Alleged developer of Tornado Cash arrested in the Netherlands

    How North Korea finances itself by stealing cryptocurrencies. In March, North Korea laundered $147.5 million stolen from the HTX cryptocurrency exchange in 2023 through the Tornado Cash cryptomixer. This is reported by Reuters, referring to confidential documents monitoring UN sanctions...
  13. Father

    Gomir: a new tool for hackers from North Korea to attack Linux

    South Korean government networks have tested the power of the Trojan. Cybersecurity company Symantec identified a new tool of the North Korean group Kimsuki, which is used to attack government and commercial organizations in South Korea. The new malware is called Gomir and is a Linux version...
  14. Father

    Deuterbear RAT attacks Asia: how BlackTech malware surprised researchers

    Originating as an evolution of Waterbear, the new Trojan has more specific goals… Cybersecurity researchers have revealed new details about a remote access Trojan called Deuterbear RAT, which is being used by China-linked hacker group BlackTech as part of a cyber-espionage campaign targeting...
  15. Father

    The main thing is not to let farmers down: Lemken is looking for ways to recover from a hacker attack

    The largest manufacturer of agricultural machinery is concerned about the safety of customers and employees. On May 11, a large-scale hacker attack occurred on the manufacturer of agricultural machinery Lemken. The operation covered all international branches of the company. In order to protect...
  16. Father

    Free Europe: Apple restricts development of alternative browsers in the EU

    The corporation has found a clever way to stifle competitors by circumventing the laws. Apple has restricted the development and support of third-party browser engines for the European Union after the forced adoption of a new DMA law allowing the use of alternative browser engines on iOS...
  17. Father

    VIEWSTATE deserialization: how the vulnerability is exploited by pro-government groups

    Solar 4RAYS has revealed details of the Obstruct Mogwai attack on a telecom company. In 2023, the Solar 4RAYS team investigated an attack on a Russian telecommunications company organized by the Asian APT group Obstinate Mogwai. Hackers have repeatedly exploited the deserialization...
  18. Father

    How to make Cryptoscam! Step-by-step instructions. Step one: Mix the acid and glycerin…

    How to create a cryptocurrency. Step-by-step instructions Disclaimer: Don't repeat it at home. This article is designed to teach you how to quickly recognize cryptoscams, knowing how they work from the inside out. Pour water on someone who wants to make Cryptoscam... and set it on fire... But...
  19. Father

    Phishing and scamming: basic techniques and trends

    Content: Phishing and scam history Phishing and scam: current types of fraud Phishing Scam Distribution Instant Messengers Social network Marketplaces Malicious methods: what phishing and scam consist of Spoofing Hacking websites Using the functionality of legitimate services Protection...
  20. Father

    Modern scam methods

    In today's digital world, where the Internet has become an integral part of our daily lives, scams and scams have become serious threats to our security and finances. Every day there are new methods and tactics used by scammers to deceive us and gain access to our personal data or financial...
Top