Search results

  1. Brother

    Trojan approach for controlling light rays through Lagrange points

    How scientists made the world play by its own rules. A recently published study in the journal Nature Physics presents a groundbreaking method for controlling and capturing light waves based on the exotic properties of Lagrange points. Scientists from the University of Southern California have...
  2. Brother

    The accounts of the largest Internet registrars were compromised in Darkweb

    The credentials of 1570 network administrators came under the control of attackers. Resecurity experts have identified more than 1,570 compromised customer credentials in the Dark Web for four of the five largest Internet registrars (RIRs), including RIPE, APNIC, AFRINIC, and LACNIC. Only ARIN...
  3. Brother

    ISIS has taken over the digital space: how countries counteract terrorists in the virtual world

    The United States is dealing a powerful blow to the financial channels of criminals. The United States is taking new steps to curb attempts by the Islamic State terrorist group to expand its virtual presence. On January 30, Washington imposed sanctions on two Egyptians accused of providing...
  4. Brother

    DALL-E 3 operation is questionable: the model reveals vulnerabilities that Microsoft is silent about

    Problems in DALL-E 3 have raised fears of Shane Jones abusing the technology. The network is actively discussing the scandalous statement of a Microsoft manager about flaws in the DALL-E 3 security system from OpenAI. According to Shane Jones, the technology allows you to create violent and...
  5. Brother

    Attack of the living dead: the malicious ZLoader downloader has risen from the digital grave

    RSA encryption and an updated domain generation algorithm carefully mask the malware's activity. Cybersecurity experts have discovered a new campaign to distribute the ZLoader malware. It is noteworthy that this happened almost two years after the botnet's infrastructure was dismantled in April...
  6. Brother

    White Phoenix Online: the well-known decryptor has become even easier to use

    Now, to restore files, just upload them to the service and click one button. CyberArk released online version of its White Phoenix tool, a free decryptor for files that have been attacked by ransomware and are encoded using intermittent encryption. The tool was first introduced back in May...
  7. Brother

    Slaughtering pigs for $40 million: a large-scale network of fraudulent investments is revealed

    How to lose everything after communicating with a stranger. According to recently disclosed court documents , the Pig Butchering scam network made about $40 million by deceiving victims and encouraging them to invest in fake cryptocurrency platforms. Fraud schemes start with the fact that...
  8. Brother

    A large-scale cyberattack knocked out key systems of a city in the state of Georgia

    Hackers severely restricted the work of state institutions. Georgia's most populous county, Fulton, with more than 1 million residents, faced a massive information system outage due to a cyberattack that occurred over the weekend. The County Board of Commissioners announced that the attack...
  9. Brother

    New York Attorney General sues Citibank

    As an international company, it has long encouraged cybercrime. Letitia James, the New York Attorney General, accuses Citibank of failing to comply with the Customer Protection from Fraud Act. The bank, according to James, not only failed to prevent the theft of funds from its customers '...
  10. Brother

    Starlink sets a new standard: the system processes 42 petabytes of data daily

    What is behind the technology that provides Internet even in Antarctica? At the SPIE Photonics West event in San Francisco, celebrating the latest advances in optics and light, SpaceX engineer Travis Brashers revealed data about the Starlink system. According to him, the system processes more...
  11. Brother

    Grandoreiro Trojan destroyed: ESET reveals details of Brazilian agents operation

    Thanks to the company's efforts, the banking Trojan stopped terrorizing Latin American banks. During a joint operation between ESET and the Brazilian Federal Police, actions were taken to stop the activities of the Grandoreiro botnet, as a result of which victims suffered $3.9 million...
  12. Brother

    Mustang Panda: Who is behind the cyber espionage against Myanmar and Asian countries?

    The political situation between the two countries forces China to deploy its own intelligence officers. In November 2023 and January 2024, the Ministry of Defense and the Ministry of Foreign Affairs of Myanmar were targeted by cyber attacks allegedly carried out by the Chinese hacker group...
  13. Brother

    Runet suffered due to an error in the domain name security system

    The investigation of the incident is still ongoing. The reason for a large-scale failure in the work of the Runet, which occurred the day before, was an error when updating the security extension key of the domain name system (DNSSEC), the Coordination Center of the domains .ru and .RF. "The...
  14. Brother

    Lawyer - worthy phishing: Scaly Wolf attacks Russian Companies with Legally Flawless Emails

    Criminals targeted industrial and logistics enterprises of the Russian Federation. BI. ZONE told about the activities of the new cybercrime group Scaly Wolf. According to experts, the group has been active since the beginning of summer 2023 and has initiated at least 10 campaigns. Criminals...
  15. Brother

    Juniper Networks выпускает срочные обновления ОС Junos для устранения серьезных недостатков

    Juniper Networks выпустила внеполосные обновления для устранения серьезных недостатков в сериях SRX и EX, которые могут быть использованы злоумышленниками для получения контроля над уязвимыми системами. Уязвимости, отслеживаемые как CVE-2024-21619 и CVE-2024-21620, коренятся в компоненте J-Web...
  16. Brother

    Новый вариант вредоносного ПО ZLoader совместим с 64-разрядной версией Windows

    Охотники за угрозами выявили новую кампанию, распространяющую вредоносное ПО ZLoader, появившуюся почти через два года после демонтажа инфраструктуры ботнета в апреле 2022 года. Говорят, что новый вариант вредоносного ПО находится в разработке с сентября 2023 года, говорится в анализе Zscaler...
  17. Brother

    Итальянский надзорный орган по защите данных обвиняет ChatGPT в нарушениях конфиденциальности

    Итальянское управление по защите данных (DPA) уведомило производителя ChatGPT OpenAI о предполагаемом нарушении законов о конфиденциальности в регионе. "Имеющиеся доказательства указывают на наличие нарушений положений, содержащихся в ЕС GDPR [Общий регламент по защите данных]", - говорится в...
  18. Brother

    Выявлены основные уязвимости системы безопасности

    Каждый новый год сопряжен с новыми вызовами и возможностями для укрепления нашей системы кибербезопасности. Такова природа отрасли – скорость, с которой злоумышленники реализуют продвинутые постоянные угрозы, приводит к постоянной, развивающейся борьбе за киберустойчивость. Преимущество...
  19. Brother

    Хакеры, связанные с Китаем, атакуют высшие министерства Мьянмы с помощью черного хода

    Базирующийся в Китае исполнитель угроз, известный как Мустанг Панда, подозревается в том, что он атаковал Министерство обороны и иностранных дел Мьянмы в рамках двух кампаний, направленных на внедрение бэкдоров и троянов удаленного доступа. Выводы получены от CSIRT-CTI, в котором говорится, что...
  20. Brother

    Schneider Electric ran into the extortionist Cactus: terabytes of data passed into the power of intruders

    Information about the power systems of major corporations can be used in subsequent attacks. Schneider Electric, one of the world's largest manufacturers of automation systems and energy solutions, has fallen victim to a Cactus ransomware attack. The incident occurred on January 17 and affected...
Top