attack

  1. Tomcat

    Attack on Holograph

    The native token of the Holograph blockchain fell by 80% after an attacker hacked the smart contract of the protocol operator and released 1 billion HLGS worth $14.4 million. On June 14, the network team confirmed the attack and reported a bug fix. The project also turned to centralized...
  2. Tomcat

    Elon Musk and Fake Crypto Exchanges: Brooklyn's Russian-Speaking Diaspora Under Attack

    The victims lost millions of dollars on fictitious investments. The Brooklyn District Attorney's office seized 70 domain names associated with a large-scale cryptocurrency scam, similar in principles to the widespread pig butchering scheme. The victims were members of the Russian-speaking...
  3. Tomcat

    Don't get hooked: how cyber fraudsters will attack in 2024

    The methods of criminals on the Internet are becoming more sophisticated every year. But in most cases, social engineering still works best. Let's imagine that a passenger is late for a train to St. Petersburg and tries to purchase a ticket 10 minutes before its departure. There is a queue at...
  4. Tomcat

    Decade-long attack: UTG-Q-008 has a firm grip on education and science

    An intricate web of hacks has enveloped hundreds of organizations around the world. Security researchers at QiAnXin recently uncovered a long-term cyber espionage operation known as "APT Operation Veles" targeting academic and educational institutions around the world. The main suspect is the...
  5. Tomcat

    Dora RAT: "Let's help cyber crooks from North Korea find a new target for the attack"

    The new malware is written in Golang and has a legal certificate from a British developer. A group of cybercriminals Andariel, associated with North Korea, has recently been actively using the new Dora RAT virus (consonant with the name of a children's TV show), which is written in the Golang...
  6. Father

    LockBit took responsibility for the attack on London Drugs: what are the consequences?

    The company did not go along with the ransomware, but the attackers made their move. The LockBit group has claimed responsibility for a cyberattack on the Canadian drugstore chain London Drugs and is now threatening to publish the stolen data after failed negotiations. The April 28 cyberattack...
  7. Father

    How and why cryptographers attack cities

    Ransomware cryptographers tend to hunt for large-scale commercial loot. However, they also target random victims who are unable to fight off a cyberattack. In this article, we will talk about how malware can harm the life of an entire city. In early February 2023, the city of Oakland, USA was...
  8. Father

    22,500 firewalls under attack: how hackers perform rooting in PAN-OS

    Palo Alto has revealed more details about a critical vulnerability in PAN-OS. Palo Alto Networks has revealed details of a critical vulnerability in the PAN-OS operating system, which has become the object of active exploitation. Vulnerability CVE-2024-3400 (CVSS score: 10.0) is a combination...
  9. Teacher

    ZenHammer - an attack method for corrupting memory contents on AMD Zen platforms

    Researchers from the Swiss Higher Technical School Zurich have developed the ZenHammer attack method, which is a variant of the RowHammer class of attacks that allows you to change the contents of individual bits of dynamic RAM (DRAM), adapted for use on platforms with AMD processors. Past...
  10. Teacher

    Notepad-- instead of Notepad++: Cybercriminals attack users in China

    How search engine advertising has become a powerful tool for hackers. Recent research has revealed that Chinese users who search for official versions of programs such as Notepad++ and VNote through search engines like Baidu are increasingly becoming victims of sophisticated attackers. Attacks...
  11. Teacher

    BEAST Attack

    Researchers at the University of Maryland (UMD) have developed a new attack that allows an attacker to bypass the prohibitions for the large language model (LLM). The BEAST method is characterized by high speed: a prudent assistant can be forced to give out harmful advice in just a minute. To...
  12. Teacher

    Million-dollar ransom: attack on children's hospital disrupted treatment of hundreds of children

    Ruthless ransomware that demanded $3.4 million for the data of small patients has been uncovered. Ransomware has demanded a ransom of $3.4 million after a cyberattack on a children's hospital in Chicago, which led to the shutdown of specialized equipment for patient care. The attack on Lurie...
  13. Brother

    Attack on PyTorch infrastructure, compromising the repository and releases

    Details of the attack on the infrastructure used in the development of the PyTorch machine learning framework were revealed, which made it possible to extract access keys sufficient to place arbitrary data in the repository with project releases on GitHub and AWS, as well as to substitute code...
  14. Brother

    Hadoop and Flink become targets for cryptojacking: What vulnerabilities do attackers use to attack

    Aqua Security reveals weaknesses in popular Apache products. Cybersecurity researchers have discovered a new type of attack that exploits flaws in the configuration of Apache's Hadoop and Flink software for deploying cryptocurrency miners to target systems. "This attack is particularly...
  15. Brother

    Attack on VF Corp: data of major shoe and clothing brands stolen

    Due to the incident, the owner of The North Face, Vans, Dickies and Timberland can barely handle processing orders. The American corporation VF Corp, which owns such well-known brands as The North Face, Vans, Dickies and Timberland, was subjected to a serious cyber attack. According to a report...
  16. Brother

    2.5 million victims: medical giant Norton Healthcare was subjected to a ransomware attack

    The organization's systems got off with little blood, but this is not the case with patient and employee data. A large network of clinics, Norton Healthcare, was subjected to a large-scale cyber attack, which resulted in data leakage of more than two million people. The organization, which...
  17. Brother

    No sweets, no joy: the attack on the chocolate giant Hershey's led to the theft of data of 2 thousand employees

    Instead of a box of goodies, the victims of the leak were offered only credit monitoring. Hershey's (The Hershey Company), one of the world's largest manufacturers of chocolate and confectionery products, was recently subjected to a cyber attack. The attackers used phishing emails sent directly...
  18. Lord777

    Ransomware attack paralyzes US prison operations

    In what may be the first ransomware attack of its kind, the hacker group Play claimed to have breached the maximum security correctional facility in Rhode Island in the northeastern United States. The Donald W. Wyatt Correctional Facility, located in Central Falls, Rhode Island, was listed on a...
  19. Carding 4 Carders

    iLeakage: new attack on Apple may lead to massive data leaks

    The imperfection of Apple processors allows you to imperceptibly siphon off all confidential user data. Scientists have developed an attack that forces the Safari browser to reveal passwords, the content of Gmail messages and other secrets, exploiting a vulnerability in the A and M series...
  20. dunkelh3it

    Kali Linux - Understanding the SMS spoofing attack vector

    Understanding the SMS spoofing attack vector The SMS spoofing attack allows the attacker to send a text SMS using SET without revealing his/her true identity or by using someone else's identity. Let's go through the steps required to perform this attack: Start the SET toolkit. You will see the...
Top