As we wrote in one of the articles, SQL is a structured query programming language (SQL, Structured Query Language) that allows programmers to communicate with large databases in almost plain English. It also gives the ability to access and manipulate data stored in tables on the server. In the case of websites, the tables can… Continue reading Types of SQL Injection: Attack Examples
Author: Stephanie Adlam
I write about how to make your Internet browsing comfortable and safe. The modern digital world is worth being a part of, and I want to show you how to do it properly.
Malware VS Ransomware: What’s the Difference?
To deal with any problem successfully you should first have a clear understanding of what you are dealing with. Nowadays the cyber threat landscape has expanded enormously with online cyber threat elements prevailing. And it would be erroneous to think that only specialists from the IT field need to know what they might come across… Continue reading Malware VS Ransomware: What’s the Difference?
TOP 7 Types of Password Attacks
What is a Password Attack? In the beginning, you probably already understood from the name what these attacks are and what they are aimed at. It is resistance against someone or something. Password attacks that are aimed at damaging accounts. They are programmed to cheat the authentication process to get into the account. After that,… Continue reading TOP 7 Types of Password Attacks
Critical Vulnerability in UNISOC Devices Patched
UNISOC-chip Android Phones are Vulnerable to Remote Modem-Targeting Attacks In May 2022, the UNISOC company was informed by Check Point Research specialists about a critical vulnerability present in UNISOC chipset devices. The flaw was confirmed by the manufacturer and patched. The vulnerability revelation happened after reverse-engineering of UNISOC LTE protocols (long-term evolution, wireless connection standard… Continue reading Critical Vulnerability in UNISOC Devices Patched
Clipminer – a Million Dollar Clipboard Hijacking Coinminer
Clipminer Malware A bizarrely efficient botnet cryptocurrency miner has been revealed by Symantec security experts. Besides its classic mining function, it has a feature of clipboard hijacking, thence comes the name of this malware – “Clipminer.” That feature alone has brought its developers approximately $1.7M. Let’s begin with the insertion. The Trojan-carried WinRAR archive originates… Continue reading Clipminer – a Million Dollar Clipboard Hijacking Coinminer
CMD-Based Ransomware YourCyanide With Info-Stealing Functions
New Threat: YourCyanide Ransomware CMD-based ransomware YourCyanide, currently under development, has been found and analyzed recently by the Trend Micro group of malware researchers. The malware in question does not yet do the data encryption, but it performs almost all the rest of the functionality. Although YourCyanide contains many additional functions, its genealogy hints that… Continue reading CMD-Based Ransomware YourCyanide With Info-Stealing Functions
What is Spear Phishing? Definition with Examples
Spear phishing is a type of phishing attack that targets specific individuals or organizations typically through malicious emails. For example, cybercriminals can pretend to be a trusted person or organization and thus try to make the victim enter confidential data, such as logins and passwords, or install malware. Such attacks are divided into the whaling… Continue reading What is Spear Phishing? Definition with Examples
Three Online Scammers Arrested in Nigeria in an Interpol’s Operation
North Africa, Southeast Asia, and Middle East oil and gas companies became cyberfraud victims. Interpol arrested three citizens of Nigeria in the country’s capital city Lagos as a part of an international operation dubbed Killer Bee. The men were suspected of using Agent Tesla remote administration tools (RAT) to redirect financial operations and corporate classified… Continue reading Three Online Scammers Arrested in Nigeria in an Interpol’s Operation
29 Moonbirds Stolen via Link Click from a Proof Collective Member
29 Moonbirds, NFTs amounting to around 750 ETC (approximately $1,5M) in value, were stolen from an unmentioned Proof Collective member as a result of a scam, according to the May 25 tweet by @CirrusNFT. The theft happened as the victim clicked an unchecked link signing a transaction offered by a scammer who pretended to be… Continue reading 29 Moonbirds Stolen via Link Click from a Proof Collective Member
Password Spraying Attack Overview
Password Spraying – quite careless, a rough form of attack. After several attempts to log in, the site begins to block the entrance. But attackers bypass this block; after the first failed attempt, they start to hack other accounts and so on. Password spraying is a kind of cyber attack. The attacker wants to hack… Continue reading Password Spraying Attack Overview