Critical Vulnerability in UNISOC Devices Patched

UNISOC-chip Android Phones are Vulnerable to Remote Modem-Targeting Attacks In May 2022, the UNISOC company was informed by Check Point Research specialists about a critical vulnerability present in UNISOC chipset devices. The flaw was confirmed by the manufacturer and patched. The vulnerability revelation happened after reverse-engineering of UNISOC LTE protocols (long-term evolution, wireless connection standard… Continue reading Critical Vulnerability in UNISOC Devices Patched

Clipminer – a Million Dollar Clipboard Hijacking Coinminer

Clipminer Malware A bizarrely efficient botnet cryptocurrency miner has been revealed by Symantec security experts. Besides its classic mining function, it has a feature of clipboard hijacking, thence comes the name of this malware – “Clipminer.” That feature alone has brought its developers approximately $1.7M. Let’s begin with the insertion. The Trojan-carried WinRAR archive originates… Continue reading Clipminer – a Million Dollar Clipboard Hijacking Coinminer

CMD-Based Ransomware YourCyanide With Info-Stealing Functions

New Threat: YourCyanide Ransomware CMD-based ransomware YourCyanide, currently under development, has been found and analyzed recently by the Trend Micro group of malware researchers. The malware in question does not yet do the data encryption, but it performs almost all the rest of the functionality. Although YourCyanide contains many additional functions, its genealogy hints that… Continue reading CMD-Based Ransomware YourCyanide With Info-Stealing Functions

Most Common Cyber Attacks Today: Tips for Protection

Cyber attacks technologies have become more sophisticated and sophisticated in the world. Any website is subject to these attacks, from which side is not clear, but you have to understand this since you use the Internet and enter your data. Yes, personal data is one of the tastiest things for intruders. They abuse your data,… Continue reading Most Common Cyber Attacks Today: Tips for Protection

Difference Between Phishing and Spoofing

What is a Phishing Attack? Phishing is a cyber-attack method that introduces malware to a computer via email. Intruders send users emails containing links under various pretexts. After clicking these links, the malware enters your computer. Thus, cybercriminals deceive the target to get as much data about the user as possible: his card numbers, bank… Continue reading Difference Between Phishing and Spoofing

What is Spear Phishing? Definition with Examples

Spear phishing is a type of phishing attack that targets specific individuals or organizations typically through malicious emails. For example, cybercriminals can pretend to be a trusted person or organization and thus try to make the victim enter confidential data, such as logins and passwords, or install malware. Such attacks are divided into the whaling… Continue reading What is Spear Phishing? Definition with Examples

Sniffing and Spoofing: Difference, Meaning

Users are increasingly encountering malicious links that, when clicked, unleash a different kind of computer destruction. In this case, it is crucial for users to be aware of the appearance of such malware, its associated links, and other potential hazards. This article aims to introduce the concepts of sniffing and spoofing, distinguish between them, explore… Continue reading Sniffing and Spoofing: Difference, Meaning

Three Online Scammers Arrested in Nigeria in an Interpol’s Operation

Photo: INTERPOL

North Africa, Southeast Asia, and Middle East oil and gas companies became cyberfraud victims. Interpol arrested three citizens of Nigeria in the country’s capital city Lagos as a part of an international operation dubbed Killer Bee. The men were suspected of using Agent Tesla remote administration tools (RAT) to redirect financial operations and corporate classified… Continue reading Three Online Scammers Arrested in Nigeria in an Interpol’s Operation

29 Moonbirds Stolen via Link Click from a Proof Collective Member

29 Moonbirds, NFTs amounting to around 750 ETC (approximately $1,5M) in value, were stolen from an unmentioned Proof Collective member as a result of a scam, according to the May 25 tweet by @CirrusNFT. The theft happened as the victim clicked an unchecked link signing a transaction offered by a scammer who pretended to be… Continue reading 29 Moonbirds Stolen via Link Click from a Proof Collective Member