News, Tips, Security Lab

Terminator and antivirus programs

Russian Hacker Sells Terminator Tool That Is Allegedly Able to Bypass Any Antivirus Programs

A tool called Terminator appeared on one of the Russian hacker forums, and, according to its author, can destroy any…

What is Business Email Compromise (BEC) Attack?

Business email compromise attack, or shortly BEC, is a relatively new vector of cyberattacks. Dealing primary damage by exposing potentially…

MOVEit MFT 0-day Vulnerability is Used to Steal Corporate Data

MOVEit managed file transfer (MFT) solution appears to contain a 0-day vulnerability, already exploited by hackers. Progress, the developer of…

New iOS Vulnerability Allows “Triangulation” Attack

New iOS vulnerability allows executing a zero-click malware delivery through the built-in iMessage messenger. The breach was discovered by Kaspersky…

DDoS-For-Hire Services Used by Hacktivists in 2023

Most people think you must be a hacker to participate in cyberattacks. However, as the last year has shown, downloading…

CAPTCHA solving services

Real People Perform CAPTCHA Solving Services for Hackers

Trend Micro analysts talked about several services that offer CAPTCHA solving services for cybercriminals. According to the researchers, often these services do not use advanced character recognition and machine learning…

Millions of Android users at risk from malicious SDK found on Google Play

Android Malware With Almost 500M Downloads Resides in Google Play

Millions of Android users may be at risk of a cyberattack because of Android malware, and multiple modifications on Google Play. In a recent blog post, Dr. Web reported that…

RarBG Website is Shut Down

RarBG Torrenting Site Is Shut Down, Admins Explain Why

RarBG, one of the most famous torrent tracker websites in the world, decided to voluntarily shut down. Launched in 2007, it faced numerous regulatory challenges and scandals throughout its history.…

Ransomware Attacks in 2023: What to Expect?

Ransomware Attacks in 2023: What to Expect?

Cybersecurity experts have published a report on worrying ransomware statistics. A survey of 435 cybersecurity professionals identified gaps, misunderstandings, and obstacles regarding organizational security, preventing attacks, and eliminating extortion. Analysts…

RaidForum Leak Contains Data of 478,000 Users

RaidForums Leaked, Data of Almost 500,000 Users Published

RaidForums, the former leader among the underground forums, now suffers the user data leak. Besides being shut down in April 2022, it is still susceptible to data breach. The data…

MDBotnet Extensively Used in DDoS Attacks

New MDBotnet Malware Rapidly Expands a DDoS Network

MDBotnet is a new malware strain that appears to be a backbone of a botnet, used in DDoS-as-a-Service attacks. Being a backdoor biassed towards networking commands, it appears to be…

Ransomware Attacks Decline in 2023

Ransomware Attacks Decline in 2023 – Is It True?

According to ransomware attacks status statistics, the trend of incidents related to this type of malware will decline in 2023. But is this really the proper conclusion, or is it…

zip and .mov for phishing

Attackers Can Use .Zip and .Mov Domains for Phishing

Experts’ fears that attackers will use new .zip and .mov domains for phishing are beginning to be justified. A new phishing kit called File Archivers in the Browser has been…

US Authorities Warn of Disaster-Related Scams

US Authorities Warn of Disaster-Related Scams

Following natural disasters and severe weather, there is a higher chance of fraudulent activities as scammers prey on vulnerable individuals or those who wish to donate to charity. Scammers use…

CAPTCHA in Discord and AI

CAPTCHA in Discord Asks Users to Find Non-Existent Objects Created by AI

Users complain that the Discord CAPTCHA provided by hCaptcha forces them to look for non-existent objects created by AI in the provided photos. For example, an object called “Yoko”, which…

GitLab Releases Patch to Critical Vulnerability

GitLab Releases Patch to Critical Vulnerability

GitLab, one of the most famous code repositories in the world, faces critical security issues in the latest update. Aside from advanced functionality, the 16.0 patch brought an extremely severe…

Godaddy Refund Phishing Scam

GoDaddy Refund Phishing Emails Spread Infostealer

Hackers started using GoDaddy Refund Emails as a disguise to trick the users into installing malware. In order to deploy the payload, they opted for a particularly new tactic or,…