Search results

  1. Friend

    Number of zero-day vulnerabilities increased by a quarter in the first half of 2024

    More than 1.2 thousand 0-day or zero-day vulnerabilities were discovered by specialists in various software in the first half of 2024. This is 25% more than in the same period a year earlier. Informzashita experts believe that the number of attacks through zero-day vulnerabilities will only grow...
  2. Friend

    Kazakhstan Closes 19 Bitcoin Exchanges with Over $60 Million in Turnover

    The delegation from Kazakhstan headed by the Chairman of the AFM Zhanat Elimanov took part in the 28th meeting of the Council of Heads of Financial Intelligence Units (CHFIU). The event was held on the sidelines of the International Financial Security Olympiad in Sochi (RF), where the...
  3. Friend

    US authorities accuse five platforms of $3.6 million cryptocurrency scam

    The U.S. Commodity Futures Trading Commission (CFTC) filed a lawsuit in the United States District Court for the Western District of Washington against five entities: Aipu Limited, Qian Bai, Lan Bai, Fidefx Investments Limited, and Chao Li, accusing them of fraudulent activities involving...
  4. Friend

    .

    Please check out the banner ads in my signature. These are verified CC shops where you can buy valid cards.
  5. Friend

    Looking for a long term customers check in bio let’s make real money guys 💯 🆔 @YunginHot

    Don't look for him, he's a scammer. Avoid such offers, they are posted only by scammers who demand prepayment and will disappear with your money.
  6. Friend

    Open channels, closed cases: how criminals expose themselves on Telegram

    WSJ: US intelligence agencies successfully use the messenger in investigations. According to The Wall Street Journal (WSJ), despite the widespread use of Telegram by criminals, the messenger has become an important tool for law enforcement agencies to penetrate criminal groups even without...
  7. Friend

    Lesson Not Learned: Onyx Loses $3.8 Million Due to Old Vulnerability

    The protocol was attacked again due to a bug in Compound Finance v2. On September 26, the decentralized finance (DeFi) protocol Onyx was attacked, as a result of which attackers managed to steal assets worth $3.8 million. Information about the incident was published by the blockchain security...
  8. Friend

    India in the crosshairs: Scale of APT36 attacks shocks researchers

    Cyfirma has revealed all the cards of Pakistani hackers. Cyfirma conducted an OSINT investigation and identified the infrastructure associated with the Transparent Tribe group (APT36), with a particular focus on command and control (C2) servers. The investigation began after a publication in X...
  9. Friend

    Bitcoin Fever: From Virtual Robbery to Real Victims

    Hostage-taking, assaults, and fights are the new reality for crypto investors. Between 2014 and 2024, the global spread of cryptocurrency led to an increase in physical violence against digital asset owners. Criminal elements find ways to gain access to large sums in bitcoin and other...
  10. Friend

    DNS Anomalies: Why You Shouldn't Host Your Web Infrastructure in China

    Proxy servers and VPNs are in the crosshairs of invisible digital forces. Experts from Assetnote have recently identified a large-scale problem of DNS query spoofing in the Chinese Internet infrastructure. When analyzing the DNS resolvers of one of the customers with a large presence in China...
  11. Friend

    Искусство цифровой разведки: руководство для кардеров

    Добро пожаловать обратно, амбициозные каредры. Если часть 1 была началом, то приготовьтесь к главному событию кардерской разведки. Мы собираемся перейти к техническим вещам, которые отделяют новичков от профессионалов. Эта часть посвящена инструментам Man in the Middle (MITM), таким как Caido и...
  12. Friend

    A bundle of exploits allows you to bypass UAC and gain admin rights in Windows

    Experts warn of a vulnerability in Windows that allows bypassing User Account Control (UAC) and escalating privileges in the system to the SYSTEM level. The issue, which is being tracked under the identifier CVE-2024-6769, received a CVSS score of 6.7. A demo exploit is currently available...
  13. Friend

    Storm-0501: Cybercriminals attack government agencies and hospitals in the United States

    The new Embargo ransomware software threatens data security. Microsoft has identified a new hacker unit tracked under the ID Storm-0501. Previously, this group collaborated with well-known ransomware gangs such as Hive, BlackCat (ALPHV), Hunters International, LockBit, and Embargo. Now...
  14. Friend

    Calculator is a Trojan: how scammers deceived Google Play and stole $70,000

    The invisible thief walked around the app store for 5 months. The Check Point Research (CPR) team has discovered a malicious cryptodrainer app on Google Play designed to steal cryptocurrency. This is the first time that the drainer is focused exclusively on mobile devices. The app used...
  15. Friend

    Hacking in the clouds: hackers manipulate the GPS systems of aircraft

    Attacks on navigation systems create a real air maze for pilots. In March, American Airlines pilot Dan Carey faced an unexpected "get up!" alarm when his Boeing 777 was over Pakistan at an altitude of more than 9,700 kilometers. The reason was GPS spoofing, which created false signals for...
  16. Friend

    Operation "Uberlingen": North Korea attacked German missile manufacturer Iris-T

    The Kimsuky group is hunting for Germany's military technology. North Korean hackers working for government agencies carried out a cyberattack on the German defense company Diehl Defense, known for the production of Iris-T guided missiles. The "Kimsuky" hacker group, which has been active...
  17. Friend

    Ordinary League of Legends players have become victims of hacker hunting

    Fake pages are massively luring gamers into a digital trap. With the start of the League of Legends (LoL) World Championship, cybercriminals have become more active on the network, using this event to distribute malware. Bitdefender experts warn that attackers are launching sophisticated...
  18. Friend

    Shadow Alliance: Africa Manipulates the Biggest Players in Cyberspace

    The world leaders are joined by an unexpected participant who turns the game in his favor. It is commonly believed that cyberspace is the sphere of influence of technological superpowers such as the United States, China, and Russia, which possess powerful and advanced capabilities. Slightly...
  19. Friend

    $2 Million Vulnerability: Bedrock Prepares Recovery Plan

    The project promises compensation after the leakage of funds. The Bedrock team has announced the identification of a vulnerability related to the uniBTC token, which affected funds worth about $2 million. Most of the losses affected liquidity pools on decentralized exchanges (DEXs LPs). Despite...
  20. Friend

    A blow to journalism: AFP hack calls into question the safety of French reporters

    Who is behind the attack and how will it affect people's trust in independent media? The French news agency AFP (Agence France-Presse) was subjected to a cyberattack that disrupted part of the systems for delivering news to customers. The incident occurred on Friday, September 27. Immediately...
Top