This year, many researchers are talking about an increase in business interest in cybersecurity and its tools. This process is largely due to the actualization of information security risks, which are based on a number of factors, from geopolitical tensions to simplifying access to malware and...
In this article, we tell you what kind of cyber training sessions there are, who cyber games are organized for, and what benefits they bring to companies and participants.
The number of targeted cyber attacks targeting companies and enterprises in Russia has been increasing recently. They are...
On the one hand, video surveillance cameras are designed to increase the level of security and control, but on the other hand, they are vulnerable to intruders and can pose a threat to their owners. Cybersecurity experts told Cyber Media how cybercriminals gain access to cameras, what it...
There is an opinion that Telegram is one of the most secure instant messengers. Nevertheless, attackers have long learned how to hack and steal accounts, gain access to personal correspondence and chat content. How this happens, why someone should hack your Telegram account, and how to protect...
This year, many researchers are talking about an increase in business interest in cybersecurity and its tools. This process is largely due to the actualization of information security risks, which are based on a number of factors, from geopolitical tensions to simplifying access to malware and...
A good example of how a vulnerability in software has paralyzed American medicine.
In February, a high-profile cyber attack on Change Healthcare caused serious disruptions in the work of US medical institutions, and now it has become known how hackers gained access to the systems.
According to...
HelloKitty changes its name and gives players a Witcher 3 build.
The operator of the ransomware program HelloKitty announced a change of name to HelloGookie and released passwords for previously leaked CD Projekt RED source codes, information about Cisco networks, and keys for decrypting data...
The negligence of administrators leads to theft of corporate data.
Forescout has discovered a new campaign that exploits a vulnerability in Fortinet FortiClient EMS devices to spread malware.
The SQL injection vulnerability CVE-2023-48788 (CVSS score: 9.8) allows an unauthorized attacker to...
UnitedHealth has shown by example that it is impossible to save money on cybersecurity.
UnitedHealth, the parent company of Change Healthcare, which was affected by the ransomware attack, reported that the total cost of eliminating the consequences of the cyber attack for the first quarter of...
Update the client version before it's too late.
PuTTY warn about a critical vulnerability affecting versions from 0.68 to 0.80. The flaw may allow an attacker to fully recover NIST-P521 private keys.
Vulnerability CVE-2024-31497 occurs due to failures in the generation of cryptographic ECDSA...
A browser with an aggressive promotion policy suddenly became the main information security hero for everyone.
Yubico, the developer of popular YubiKey authentication devices, has warned Windows users about a serious vulnerability in its software. According to the company's official...
Wukong can now conduct a full-fledged quantum war with other systems.
Chinese quantum computer Origin Wukong received a new protection against attacks of quantum systems 3 months after access to it was opened to the whole world.
Origin Wukong, China's first third-generation superconducting...
Ahmed's case is the first of its kind that the U.S. Attorney's Office has faced.
Shakib Ahmed, a New Yorker, was sentenced to 3 years in prison for hacking two crypto exchanges and stealing more than $5 million worth of cryptocurrencies. According to the prosecutor's office, this is the first...
Spotlighting and Watchdog are designed to be a key link in protecting user data when communicating with chatbots.
Microsoft announced the creation of new technologies aimed at countering threats related to hacking AI systems. The AI Spotlighting and AI Watchdog functions will protect against...
Several vulnerabilities in webOS at once unleash the hands of cybercriminals.
Researchers from Bitdefender discovered four vulnerabilities in several versions of webOS, the operating system used in LG smart TVs. These flaws allow attackers to gain unauthorized access and control over devices at...
Data from almost 57,000 users ended up online.
According to open sources, the Kaspersky Lab fan club forum was hacked, as a result of which the RGB hacker group made public the personal data of 56,798 users.
The forum is a popular platform for discussing Kaspersky Lab products, sharing...
The US government contractor specified what information fell into the hands of hackers.
Acuity, a US government contractor, confirmed that its GitHub repositories were hacked, as a result of which the attackers stole documents. According to the company, the stolen information was "outdated and...
Quite often, the Russian authorities make extremely contradictory statements. For example, back in 2022, it was proposed to officially lift the ban on downloading pirated software, games and other intellectual property of foreign companies that left the Russian market. The idea was in the air...
The trading Telegram bot BONKbot on the Solana network was allegedly subjected to a hacker attack, as a result of which users lost about $208,000.
CertiK analysts drew attention to multiple reports of losses and allowed a possible leak of private keys.
The exact cause of the exploit remains...
Think twice before ordering a replica of the iconic Jordans from China.
The popular online shopping platform PandaBuy, which specializes in the delivery of clothing, shoes and other goods from China, recently faced a large-scale data leak that affected about 1.3 million customers. At least two...