The well-known virus has received a new mask and has become even more dangerous.
Cisco Talos has discovered new activity from cybercriminals distributing a modified version of the MedusaLocker ransomware. Experts found that the group operates globally, but a greater number of attacks were...
The attackers chose an unexpected way to deliver malicious code.
Kaspersky Lab experts have identified a new threat to macOS users in China: the HZ RAT malware, which was previously known only in the Microsoft Windows version. The Trojan is distributed through popular Chinese instant messengers...
Cado Security explains about SSWW and other operations.
According to a new study by Cado Security, attackers have begun to actively use the Cloudflare WARP service to conduct attacks on vulnerable Internet resources.
Cloudflare WARP is a free VPN service that optimizes traffic by routing it...
Hackers actively recruit accomplices on cybercrime forums.
In 2023, Mallox ransomware activity increased significantly — by 174% compared to last year, according to new data obtained by Unit 42 specialists from Palo Alto Networks.
"Mallox, like many other extortionate groups, follows the...
This is a rare case when the public will take the side of cybercriminals.
Cybersecurity researchers have discovered an unusual malware campaign targeting people searching for child pornography online. Instead of extorting money from random victims, as is usually the case, this time the...
A dangerous botnet changes IP addresses like gloves, just to avoid detection by security systems.
Cisco published recommendations for its customers on how to protect against password-guessing attacks targeting Remote Access VPN (RAVPN) services configured on Cisco Secure Firewall devices.
The...
Traces of the group's unique Trojan lead to Kiev.
Experts from the Threat Intelligence department of F. A. C. C. T. have identified a new hacker group called PhantomCore. Since January 2024, this group has been actively attacking Russian companies using the unique, previously unknown remote...
Who is behind the new malware campaign and what are its goals?
Aqua Security identified a new malware campaign targeting the Apache big data stack, specifically Hadoop, Druid, and Flink. Attackers use vulnerabilities and incorrect settings in cloud-based Honeypots to launch these attacks. Only...
How did researchers from Seoul manage to solve the secret hacker cipher?
Cybersecurity experts have discovered an implementation vulnerability in the Rhysida ransomware that allowed them to recover encryption keys and decrypt data blocked by the malware. The discovery was published by a team of...
Asian countries suffer the most, but hackers can hardly expand their activity zone.
In the field of cybersecurity, a new serious threat is gaining momentum. A group of cybercriminals known as DarkCasino is exploiting a newly discovered vulnerability in the WinRAR software to launch hacking...
A group of hackers with extensive experience continues their attacks, bypassing the protection and attention of victims.
According to a report by Anheng, the Confucius group (APT59) is attacking government and military structures in South and East Asia. Recently, experts discovered a new...
ATM attacks that use special malware and jackpotting techniques no longer generate normal income for cybercriminals. In the first half of 2019, ATM gangs raised less than € 1,000 per successful campaign.
In total, banks across Europe have reported 35 incidents involving ATM malware and...
There is an opinion that attackers are using increasingly sophisticated techniques to break into financial institutions, including state-of-the-art viruses, exploits from the arsenal of special services, and well-targeted phishing.
Step 1: Define your Goals
In the offline world, it can be...
In this chapter, we will learn how to use Wi-Fi cracking tools that Kali Linux has incorporated. However, it is important that the wireless card that you has a support monitoring mode.
Fern Wifi Cracker
Fern Wifi cracker is one of the tools that Kali has to crack wireless.
Before opening Fern...
DDoS attack is a hacker attack on a website, the main task of which is to lead to a denial of service, in which the interaction of users with services and sites will be difficult or impossible. It differs from a DoS attack in that it is carried out from multiple devices and addresses at once...
Almost any ATM today can be hacked fairly easily by cybercriminals using malware, and sometimes even without it. And all because of the outdated software used in ATMs, errors in network settings and the lack of basic physical protection of important components of these machines.
These...