If your crypto wallet was created before 2016, you should carefully study all the risks.
Bitcoin wallets created between 2011 and 2015 may be vulnerable to a new type of exploit called Randstorm. The exploit allows you to recover passwords and gain unauthorized access to a variety of wallets on...
Asian countries suffer the most, but hackers can hardly expand their activity zone.
In the field of cybersecurity, a new serious threat is gaining momentum. A group of cybercriminals known as DarkCasino is exploiting a newly discovered vulnerability in the WinRAR software to launch hacking...
Zero-day in a popular email client resulted in data loss for thousands of users.
A zero-day vulnerability was discovered in the Zimbra email software, which was exploited by four different groups of hackers to steal email data, user credentials, and authentication tokens.
Google TAG experts...
Tavis Ormandy, a security researcher at Google, has identified a new vulnerability (CVE-2023-23583) in Intel processors, codenamed Reptar, which is mainly dangerous for cloud systems running virtual machines of different users. The vulnerability can cause the system to freeze or crash when...
The Aave DeFi protocol suspended some operations after the vulnerability was discovered. The project reported that users ' funds are safe.
After confirming the information, community developers have taken the following preventive measures::
* Suspended Aave V2 Ethereum and some assets on...
Experts detail the activity of cybercriminals.
Specialists of the information security company Mandiant found active exploitation of vulnerabilities in the NetScaler ADC and Gateway systems of Citrix. The issue of CVE-2023-4966 (CVSS: 9.4) was fixed at the end of August 2023, but was not made...
How does the CIA's tool relate to such a deliberate attack?
The information security company Sangfor discovered a series of phishing attacks that exploit a vulnerability in WinRAR. Documents related to the geopolitical issues of Belarus and Russia serve as bait for victims, and the sender of...
When high technologies lose out to numbers.
On October 7, 2023, Israel's famed Iron Dome defense system, renowned for its advanced missile interception capabilities, faced an unexpected threat. Despite its historic 90% efficiency, the system was overwhelmed by a massive rocket attack from the...
If you're the owner, you'd better check your devices.
More than 40,000 Cisco devices running on the IOS XE operating system were compromised after hackers exploited a newly discovered maximum-security vulnerability known as CVE-2023-20198 . At the moment, there is no patch or workaround, and...
Find out if your network is secure.
Cisco strongly recommends that its customers secure their devices after discovering a critical vulnerability that is currently being actively exploited by attackers, giving them full administrative control over their networks. Successful exploitation of this...
Sharing has played a cruel trick on Confluence users.
On October 4, Atlassian, an Australian company specializing in the production and support of enterprise collaboration software, issued an official warning regarding CVE-2023-22515, a critical security flaw in privilege escalation in the...
Apple urgently fixes a bug that allows you to take control of the device.
Apple has released emergency security updates to address a new zero-day vulnerability that was exploited in attacks on iPhone and iPad users. In an official statement, Apple said that it is aware of the active...
LockBit under suspicion: What do hackers know about British defense?
Secret information about key military and intelligence facilities in the UK was published in the public domain. According to The Daily Mirror, hackers associated with the LockBit group are behind the incident. However...
Owners of the Skylake, Tiger Lake, and Ice Lake processor families — this information is for you.
Microsoft published recommendations for managing the risks associated with the recently disclosed vulnerability CVE-2022-40982, commonly known by the code name "Downfall".
The security flaw...
The U.S. Federal Government's internal Cybersecurity Vulnerability Center accepted more than 1,300 valid reports in its first 18 months of operation. This saved about $4.35 million in system response and recovery costs, according to the program's first annual report.
The Vulnerability...
Experts assessed the breach as critical and recommended an urgent update of the vulnerable software.
The US Cybersecurity Agency (CISA) has added a vulnerability with the identifier CVE-2023-26359 to the catalog of known vulnerabilities used. Experts gave it a severity rating of 9.8 out of 10...
Cybercriminals have discovered a vulnerability in the integration of PayPal with Google Pay and are actively exploiting it for illegal money transfers. Starting on February 21 of this year, users began to notice unknown transactions in their PayPal payment histories made through Google Pay. User...
A joint team of researchers from the Ruhr and New York Universities has developed a new attack method that allows you to impersonate a legitimate user on a mobile network. The technique, dubbed IMP4GT (IMPersonation Attacks in 4G NeTworks), exploits a vulnerability in 4G LTE, namely the lack of...
Researchers at the University of New Mexico have discovered a vulnerability affecting Ubuntu, Fedora, Debian, FreeBSD, OpenBSD, macOS, iOS Android, and other Unix-based operating systems. The problem allows you to eavesdrop, intercept and interfere with the operation of VPN connections.
The...
If the iPhone is connected to a Wi-Fi network named "%p%s%s%s%s%n" then it will RiP.
The bug can only be fixed by completely resetting the network settings.
This can be done in the Settings -> General -> Reset -> Reset network settings menu.
There is another way:
The problem this time arises...