News, Tips, Security Lab

6 Most Common TikTok Scams To Be Aware 2022

6 Most Common TikTok Scams To Be Aware 2022

TikTok has become a popular social network with over a billion registered users. According to statistics, each user spends about…

Hack Group Bl00Dy Is Already Using Leaked LockBit Builder

Researchers have discovered that the young ransomware group Bl00Dy is already using in its attacks the LockBit builder, which leaked…

Lazarus Hackers Attack MacOS Users by impersonating Crypto[.]com

Sentinel One has discovered that the North Korean hacker group Lazarus is targeting macOS users selectively. Attackers are using fake…

Ukrainian Law Enforcers Arrested Hackers Who Sold More Than 30 million Accounts

Ukrainian law enforcers reported that they “neutralized” and arrested hackers from a cybercriminal group operating from Lviv. The group specialized…

Difference HTTPS vs. HTTP? Why is HTTP not secure?

Any web page is stored on a server, a computer that is permanently connected to the Internet. When you follow…

Scammers Use Fake Dating Sites to Steal Money

Scammers Use Fake Dating Sites to Steal Money

Experts from ReasonLabs have discovered an unusual malicious scheme that has been operating since 2019 – carders used fake dating sites to steal and launder funds. Also read our article:…

Trackid=sp-006 — What is this thing?

Trackid=sp-006 — What is this thing?

Cookie tracking is a kind of network activity on the server side that is considered potentially dangerous by regulatories. Trackid=sp-006 is an example of a malicious cookie tracker that spoofs…

Hackers Use CircleCI Fake Notifications to Access GitHub Accounts

Hackers Use CircleCI Fake Notifications to Access GitHub Accounts

GitHub warns that a large-scale phishing campaign aimed at users began on September 16: scammers send emails with fake notifications on behalf of the Circle CI service, which is used…

LockBit 3.0 Builder leaked to the public

LockBit 3.0 Builder leaked to the public

On September 21, 2022, a new Twitter user Ali Qushji published what is supposed to be a LockBit Ransomware builder. According to what the user says, this application is for…

Pegasus Spyware — The Most Dangerous Malware

Pegasus Spyware — The Most Dangerous Malware

Pegasus Spyware is a malicious program that is covered with multiple layers of secrets, rumours and false claims. That military-grade malware is something like a legend, that sometimes makes people…

Top Working Antispyware Tips 2022

Top Working Antispyware Tips 2022

By using the Internet, the user risks being compromised. The intruders are still trying to hijack your confidential data and credit card numbers, distribute spyware, and the like. With each…

What to Do if A Scammer Has Your Email Address?

What to Do if A Scammer Has Your Email Address?

Scammers usually hack into email accounts to send fake messages from a trusted address, making recipients fall for their tricks. For example, to get them to send money, transmit personal…

Gamaredon Hack Group Uses New Malware to Attack Ukrainian Organizations

Gamaredon Hack Group Uses New Malware to Attack Ukrainian Organizations

Cisco Talos analysts write that the Russian-speaking hack group Gamaredon (aka Primitive Bear, Shuckworm, IronTiden and Callisto) is attacking Ukrainian organizations with the help of a new infostealer. The targets…

Attackers Began to Embed Keyloggers in Phishing Pages

Attackers Began to Embed Keyloggers in Phishing Pages

Analysts from the Cyble company recorded an interesting phishing campaign against users from Greece: attackers began to embed keyloggers into phishing pages. The operators of this scam operate phishing sites…