News, Tips, Security Lab

ChatGPT is Used to Create Phishing Emails With Social Engineering

ChatGPT has become a New tool for Cybercriminals in Social Engineering

Artificial intelligence has become an advanced tool in today’s digital world. It can facilitate many tasks, help solve complex multi-level…

Conti Ransomware Heritage in 2023 – What is Left?

Ransomware groups come and go, but the people behind them continue to use their hacking and extortion skills in new…

The AI-Controlled Drone Did Not “Kill” Its Operator Even During the Simulation. At Least for Now

At the recent Future Combat Air and Space Capabilities summit, the head of AI testing and operations at the US…

Russian Hacker Sells Terminator Tool That Is Allegedly Able to Bypass Any Antivirus Programs

A tool called Terminator appeared on one of the Russian hacker forums, and, according to its author, can destroy any…

What is Business Email Compromise (BEC) Attack?

Business email compromise attack, or shortly BEC, is a relatively new vector of cyberattacks. Dealing primary damage by exposing potentially…

MOVEit MFT 0-day Allows Unautorized Access

MOVEit MFT 0-day Vulnerability is Used to Steal Corporate Data

MOVEit managed file transfer (MFT) solution appears to contain a 0-day vulnerability, already exploited by hackers. Progress, the developer of the software solution, already released a note and security advisory…

iOS is Vulnerable to Zero-Click Exploit That Deploys Triangulation Spyware

New iOS Vulnerability Allows “Triangulation” Attack

New iOS vulnerability allows executing a zero-click malware delivery through the built-in iMessage messenger. The breach was discovered by Kaspersky analytics team, and appears to touch almost every user of…

DDoS for Hire Services Gain Popularity

DDoS-For-Hire Services Used by Hacktivists in 2023

Most people think you must be a hacker to participate in cyberattacks. However, as the last year has shown, downloading specific software or paying money is sometimes enough. Moreover, with…

CAPTCHA solving services

Real People Perform CAPTCHA Solving Services for Hackers

Trend Micro analysts talked about several services that offer CAPTCHA solving services for cybercriminals. According to the researchers, often these services do not use advanced character recognition and machine learning…

Millions of Android users at risk from malicious SDK found on Google Play

Android Malware With Almost 500M Downloads Resides in Google Play

Millions of Android users may be at risk of a cyberattack because of Android malware, and multiple modifications on Google Play. In a recent blog post, Dr. Web reported that…

RarBG Website is Shut Down

RarBG Torrenting Site Is Shut Down, Admins Explain Why

RarBG, one of the most famous torrent tracker websites in the world, decided to voluntarily shut down. Launched in 2007, it faced numerous regulatory challenges and scandals throughout its history.…

Ransomware Attacks in 2023: What to Expect?

Ransomware Attacks in 2023: What to Expect?

Cybersecurity experts have published a report on worrying ransomware statistics. A survey of 435 cybersecurity professionals identified gaps, misunderstandings, and obstacles regarding organizational security, preventing attacks, and eliminating extortion. Analysts…

RaidForum Leak Contains Data of 478,000 Users

RaidForums Leaked, Data of Almost 500,000 Users Published

RaidForums, the former leader among the underground forums, now suffers the user data leak. Besides being shut down in April 2022, it is still susceptible to data breach. The data…

MDBotnet Extensively Used in DDoS Attacks

New MDBotnet Malware Rapidly Expands a DDoS Network

MDBotnet is a new malware strain that appears to be a backbone of a botnet, used in DDoS-as-a-Service attacks. Being a backdoor biassed towards networking commands, it appears to be…

Ransomware Attacks Decline in 2023

Ransomware Attacks Decline in 2023 – Is It True?

According to ransomware attacks status statistics, the trend of incidents related to this type of malware will decline in 2023. But is this really the proper conclusion, or is it…

zip and .mov for phishing

Attackers Can Use .Zip and .Mov Domains for Phishing

Experts’ fears that attackers will use new .zip and .mov domains for phishing are beginning to be justified. A new phishing kit called File Archivers in the Browser has been…

US Authorities Warn of Disaster-Related Scams

US Authorities Warn of Disaster-Related Scams

Following natural disasters and severe weather, there is a higher chance of fraudulent activities as scammers prey on vulnerable individuals or those who wish to donate to charity. Scammers use…