Internet Explorer shutdown. The Epithaf

Internet Explorer, IE, Microsoft, Microsoft Edge,

On June 15, Microsoft will finally end support for Internet Explorer on various versions of Windows, almost 27 years after its launch on August 24, 1995. The desktop version of IE will be disabled and replaced with the new Microsoft Edge, with users automatically redirected to Edge when they launch Internet Explorer 11. Internet Explorer… Continue reading Internet Explorer shutdown. The Epithaf

Team Xecuter’s life. How hackers leave after the arrest?

Team Xecuter, hackers, Hacking, Nintendo, FBI, U.S. DoJ

Gary Bowser, the Nintendo hacker, appears to be a very happy cybercriminal. Despite a prison term and another arrest, the 50-year-old Frenchman is enjoying life. So does his “collegue” – Max Louarn, the chief of Team Xecuter gang. The Nintendo Hacker keeps going As reported by SecurityLab in February of this year, Gary Bowser was… Continue reading Team Xecuter’s life. How hackers leave after the arrest?

Companies Manage to Bargain With Ransomware Racketeers

Revelations of the Ransom-Negotiator In May, the racketeer-bargaining specialist (the negotiator) at a European production company had received an unexpected chat message from a malefactor who had hacked the specialist’s client. Ransom negotiations, aimed at lowering the demands of racketeers, are the realm totally dominated by lawyers, consulting, and information security companies who know the… Continue reading Companies Manage to Bargain With Ransomware Racketeers

The US Department of Justice Reports a Russian Botnet Dismantled

RSOCKS Russian Botnet Is No More as a Result of a Joint Operation According to the June 16 report by the US Department of Justice, the activity of a Russian botnet RSOCKS has been stopped in a joint operation by the US, German, Dutch, and British law enforcement agencies. RSOCKS is responsible for hacking millions… Continue reading The US Department of Justice Reports a Russian Botnet Dismantled

10 Types of Cyber Security Attacks in IoT

In a world where information progress is rapidly developing, it is impossible to do without IoT. You probably don’t know what you’re talking about, so let’s take a quick look at this acronym. IoT(Internet of things) – is a large number of Internet things that interact with each other. In other words, it’s data transfer… Continue reading 10 Types of Cyber Security Attacks in IoT

Penetration Testing: Stages and Methods

What is penetration testing? Penetration testing is a method by which the security of computer systems and networks can be assessed by simulating a hacker’s attack. It is possible to attempt cracking systems and applications via penetration testing. It allows identifying vulnerabilities in applications’ interfaces, application programming interfaces, or elsewhere in the system. If such… Continue reading Penetration Testing: Stages and Methods

Around 2000 People Arrested by Interpol for Internet Scams

Operation “First Light” The war on cybercrime goes on. As its next round unwinds in 2022, Interpol arrests hundreds of Internet-fraud-related suspects within two months. The operation in question got dubbed First Light and concentrated on raiding illegal call centers in different countries, with the seized funds amounting to $50 million in assets. These offices… Continue reading Around 2000 People Arrested by Interpol for Internet Scams

VPN, Proxy, or Tor: Differences, Meaning

You’ve probably heard the words VPN, Proxy, and Tor. You may even regularly use these technologies to remain anonymous, bypass blockades, view content blocked in your region, or simply access your corporate network. But how exactly do these technologies work, and how do they differ? Today we’ll talk about how to protect yourself and your… Continue reading VPN, Proxy, or Tor: Differences, Meaning

BlackCat ransomware gang publishes leaked data on the clear web site

BlackCat/ALPHV group recently announced on its victim shaming and extortion website that it had hacked into a luxury spa and resort in the Western United States. At one moment in the last 24 hours, ALPHV posted a website with the same victim name on the domain and their logo on the front page. The ALPHV… Continue reading BlackCat ransomware gang publishes leaked data on the clear web site

War in Ukraine triggered a Stream of amateurish ransomware

Ransomware, Ransomware attacks, Conti, LockBit

Russia has provoked hackers around the world to focus their attacks on the servers of the largest companies, TV channels, banks, and government agencies. According to the statistics given by ESET, Russia has entered the list of the most attacked countries, which was not relevant earlier. More and more amateur hackers appeared after February, 24… Continue reading War in Ukraine triggered a Stream of amateurish ransomware