News, Tips, Security Lab

MITER experts have published a list of the 25 most dangerous problems of 2022

MITER experts have published a list of the 25 most dangerous problems of 2022

MITER experts have published a list of the 25 most common and dangerous problems of 2022. Such bugs can potentially…

ZuoRAT Trojan Hacks Asus, Cisco, DrayTek and NETGEAR Routers

Lumen Black Lotus Labs has discovered a new Remote Access Trojan (RAT) called ZuoRAT, which has been attacking remote workers’…

Hackers Launched LockBit 3.0 and Bug Bounty Ransomware

The LockBit ransomware group released the LockBit 3.0 malware, at the same time introduced its own bug bounty ransomware program,…

LockBit Weaponizes Its Victims’ Clients – Brett Callow

Brett Callow, a cybersecurity analyst at Emsisoft, shared information on his Twitter about the broadened tactics the LockBit ransomware group…

Phishers Can Bypass Multi-Factor Authentication with Microsoft Edge WebView2

An information security expert known as mr.d0x has developed a new attack technique that abuses Microsoft Edge WebView2 applications to…

Conti vs. LockBit 2.0 – a Trend Micro Research in Brief

Conti vs. LockBit 2.0 – a Trend Micro Research in Brief

Trend Micro, a Japanese IT security company, has published a thorough comparison of behaviors of two major ransomware groups: Conti and LockBit 2.0. Here you can read a shorter summary…

Conti Ransomware Shutdown, Site Disabled

Conti Ransomware Shutdown, Site Disabled

Conti operators shut down the remnants of the public infrastructure. Two servers on the Tor network that were used to publish victims’ data and negotiate ransoms are down. The admin…

Copyright Claims Used as Bait by LockBit 2.0 Affiliates in Korea

Copyright Claims Used as Bait by LockBit 2.0 Affiliates in Korea

A new type of email-bait has been invented by the affiliates of LockBit 2.0. Specialists at AhnLab Inc, a South Korean security software company, have noticed that LockBit 2.0 affiliates…

How to Prevent Crimeware Attacks: Users` Guide

How to Prevent Crimeware Attacks: Users` Guide

You may come across the term “Crimeware” and understandably get confused as you probably thought before that only malware or viruses are the words for the definition of any bad…

NCC Group’s May 2022 Threat Report Reflects Conti’s End

NCC Group’s May 2022 Threat Report Reflects Conti’s End

NCC Group’s monthly report on cyber threats features some curious news, namely the alleged closure of ransomware group Conti and the strengthening of the Lockbit 2.0 gang. Conti, a notorious…

Privacy Access Tokens to Replace CAPTCHA Real Soon

Privacy Access Tokens to Replace CAPTCHA Real Soon

CAPTCHA, a well-known test for website visitors to prove they are humans, not robots, rapidly grows obsolete. There are ways to break or bypass CAPTCHA, and there are obvious inconveniences…

Chinese Hackers Use Ransomware As a Cover for Espionage

Chinese Hackers Use Ransomware As a Cover for Espionage

Secureworks experts have found that Chinese hackers from two groups that specialize in espionage and theft of intellectual property from Japanese and Western companies use ransomware to hide their actions.…

8 Symptoms Of Adware: How to Avoid it

8 Symptoms Of Adware: How to Avoid it

What is adware meaning? It is an agressive software whose goal is to collect marketing information about the user loading them with an avalanche of advertisements, often in the form…

Google Report Companies Creating Mobile Spyware for Governments

Google Report Companies Creating Mobile Spyware for Governments

Google Reveals An Italian Company to Sell Android and iOS Spyware to Governments In its blog, Google has published a report revealing that multiple companies have been crafting and selling…