Greta Thunberg became the most popular character in phishing campaigns
Check Point analysts prepared a traditional monthly report on the most active…
IS specialist introduced a PoC exploit for one of the most dangerous vulnerabilities in Windows
The day after the release of the fix for one of the…
Microsoft released farewell updates for Windows 7 and Windows Server 2008
On January 14, 2020, Microsoft stopped supporting Windows 7 for PCs of…
Fancy Bear Attacked Ukrainian Oil And Gas Burisma Company
Fancy Bear, also known as APT28, orchestrated an attack on Burisma. Hackers…
Cable Haunt Vulnerability Threats Millions of Modems with Broadcom Chips
Danish researchers have published a report on the Cable Haunt vulnerability that…
Researcher remotely hacked iPhone using only one vulnerability
Researcher in a few minutes remotely hacked iPhone using only Apple ID…
Researchers hacked TikTok app via SMS
Check Point experts found many issues in one of the world's most…
US Homeland Security warns of possible cyberattacks by Iran
Homeland Security USA issued a warning about possible acts of terrorism and…
Shitcoin Wallet for Google Chrome steals cryptocurrency passwords and keys
One of the extensions for Google Chrome, Shitcoin Wallet injects a special…
My Digital Life forum community has found an illegal way to extend support for Windows 7
The community of the My Digital Life online forum has found an…
Emotet topped the rating of the most common threats in 2022
Any.Run, interactive service for automated malware analysis has compiled a list of…
ToTok messenger turned out to be a tool for total tracking
The New York Times reported that the ToTok messenger turned out to…