Media Reports that Garmin Paid Ransom to WastedLocker Malware Operators

In July 2020, Garmin, the manufacturer of wearable electronics and navigation equipment, suffered from a cyberattack and was forced to temporarily shut down a number of services. Now there is information in the media that Garmin has paid the ransom to the WastedLocker malware operators. At the same time, the incident affected not only wearable… Continue reading Media Reports that Garmin Paid Ransom to WastedLocker Malware Operators

Attacks on EMV cards, which were only a theory for 12 years, noticed in reality

Experts from the Gemini Advisory company published a report, according to which on underground hacker forums were found two precedents, when hackers collected EMV card data and put this information up for sale. Thus, attacks on EMV cards, which were only a theory 12 years, have been noticed in reality. The ZDNet publication says that… Continue reading Attacks on EMV cards, which were only a theory for 12 years, noticed in reality

Hacker “Tamagotchi” Flipper Zero hits Kickstarter and collects 7 times more than planned

Hacker “Tamagotchi” Flipper Zero hits Kickstarter today. It was required to raise 60,000 dollars to start production of the devices, and those who predicted failure of the project were clearly wrong. The fact is that the required amount was collected in a matter of minutes after the start of the campaign, and the $99 devices… Continue reading Hacker “Tamagotchi” Flipper Zero hits Kickstarter and collects 7 times more than planned

Ransomware attack caused Garmin’s four-day services outage

Earlier this week, manufacturer of electronics and navigation equipment Garmin suffered a cyberattack and was forced to temporarily shut down a number of services. Now the company said that ransomware attack caused Garmin’s four-day services outage. At the same time, the incident affected not only wearable gadgets and related services, but also flyGarmin and Garmin… Continue reading Ransomware attack caused Garmin’s four-day services outage

Information security specialists disclosed details of five vulnerabilities in D-Link routers

Loginsoft experts have reported about five serious vulnerabilities found in some models of D-Link routers. Even worse, support for some vulnerable devices has already been discontinued, which means they will not receive patches, while PoC exploits for problems have already been made public. Among discovered by researchers problems were: reflected XSS attacks; a buffer overflow… Continue reading Information security specialists disclosed details of five vulnerabilities in D-Link routers

Steve Wozniak Sues YouTube Over Cryptocurrency Scammers

Steve Wozniak and more than ten other plaintiffs have sued YouTube over fraudulent videos advertising fake Bitcoin giveaways. The fact is that scammers are very fond of using names of famous people in their scams. For example, last month, attackers hijacked three fairly popular YouTube channels and gave them new names associated with SpaceX. Then… Continue reading Steve Wozniak Sues YouTube Over Cryptocurrency Scammers

DeepSource Developers Talked about Hacking of Their GitHub Application

A popular automated code analysis tool, DeepSource, is designed to identify vulnerabilities, bugs, and performance issues. Also, for more convenience, it has integration with GitHub, and now the DeepSource developers talked about hacking their GitHub application. DeepSource reported this week that GitHub security had notified them of potentially malicious activity in June. “On July 11th,… Continue reading DeepSource Developers Talked about Hacking of Their GitHub Application

Prometei botnet uses SMB for distribution

Cisco Talos has discovered a new botnet, Prometei, which was active since March 2020 and focused on mining the Monero (XMR) cryptocurrency. The researchers note that the Prometei botnet intensively uses the SMB protocol for distribution. The malware mainly attacks users from the USA, Brazil, Pakistan, China, Mexico and Chile. During four months of activity,… Continue reading Prometei botnet uses SMB for distribution

Google cloud services are used for phishing

Attackers, whose main goal is to steal various credentials, are increasingly turning to public cloud services to host decoy files and phishing pages. Even Google services are now being used for phishing. Check Point experts warn that earlier this year they discovered a campaign, which was abusing Google cloud services. The scammers have developed an… Continue reading Google cloud services are used for phishing

REvil Operators Demand $7.5 Million Ransom from Argentine Internet Provider

Last weekend, one of Argentina’s largest internet providers, Telecom Argentina, suffered from REvil (Sodinokibi) ransomware attack. Malware has infected about 18,000 computers, and now REvil operators demand $7.5 million from the company. The ZDNet magazine writes that the attackers managed to gain domain administrator rights, thanks to which the ransomware quickly spread to 18,000 workstations.… Continue reading REvil Operators Demand $7.5 Million Ransom from Argentine Internet Provider