Apocalypse Now: experts presented a new type of cyber-biological attack
On Monday, November 30, specialists from the Ben-Gurion University of Negev (Israel) presented a new type of cyber-biological attack that can bring biological warfare to a new level. The attack,…
Hackers create scam e-commerce sites over hacked WordPress sites
Akamai specialist Larry Cashdollar discovered a hacker group that uses hacked WordPress sites in an interesting way. First, hackers run fraudulent online stores over WordPress sites. Second, they poison XML…
Researcher accidentally found 0-day bug in Windows 7 and Windows Server 2008
French cybersecurity researcher Clément Labro was working on a security tool when he discovered that Windows 7 and Windows Server 2008 R2 were vulnerable to a 0-day local privilege escalation…
NATO experimented with deceptive techniques to combat Russian hackers
During a cyber exercise in Estonia on November 16-20, NATO experts experimented with deceptive techniques - they practiced in catching Russian government-funded hackers using specially placed traps. The exercise, coordinated…
The researcher showed how to steal a Tesla Model X in a few minutes
Information security specialist Lennert Wouters from the Catholic University of Leuven showed how to steal a Tesla Model X. He discovered a bug that allowed hacking and changing the firmware…
LidarPhone attack will make your vacuum cleaner spy on you
A group of scientists from the University of Maryland and the National University of Singapore have demonstrated the LidarPhone attack, which can turn a smart vacuum cleaner into a spy…
Cybercriminals started using Google services more often in phishing campaigns
Security researchers have reported an increase in cyberattacks using Google services in phishing campaigns, as a tool to bypass security and steal credentials, credit cards, and other personal information. The…
Though 2020 is ending, the list of worst passwords is still topes “123456”
The end of the year is approaching, and the developers of the password manager NordPass have once again published a list of the most popular and weak passwords of 2020.…
Chrome 87 Fixed NAT Slipstream Vulnerability and Disabled FTP Support
Google engineers introduced Chrome 87, in which was disabled FTP support. The new version of the browser is already available for users of Windows, Mac, Linux, Chrome OS, Android and…
VoltPillager attack compromises Intel SGX
A group of researchers from the University of Birmingham have demonstrated the VoltPillager attack, which can violate the confidentiality and integrity of data in Intel SGX enclaves. To implement this,…
Microsoft accused Russia and North Korea of attacks on pharmaceutical companies
Microsoft representatives accused Russia and North Korea of attacks on pharmaceutical companies. They reported that, according to their data, in recent months, three APT groups have attacked at least seven…
CostaRicto mercenary hackers target financial institutions around the world
BlackBerry experts told about the discovery of a group of mercenary hackers called CostaRicto. This is the fifth group of mercenary hackers identified by experts this year. So, back in…