Magecart groupings extract stolen cards data via Telegram
An information security specialist known under the pseudonym Affable Kraut discovered that Magecart web skimmer operators extract stolen cards data through Telegram channels. He concluded this based on information obtained…
Ukraine’s largest IT company SoftServe has been attacked by a ransomware
One of the largest IT companies in Ukraine, SoftServe (number 2 in the latest DOU.UA rating), was attacked by a ransomware. A number of the company's services stopped working, according…
KryptoCibule malware steals cryptocurrency from Windows users
ESET specialists discovered the KryptoCibule malware, which has been active since 2018 and steals cryptocurrency from Windows users in the Czech Republic and Slovakia (these countries accounted for 85% of…
Shlayer malware bypassed Apple security checks
Security expert Peter Dantini discovered that the Shlayer malware bypassed Apple's checks: it successfully passed the software notarization process and could run on any Mac running macOS Catalina and newer.…
Scientists have developed an attack that allows not to enter a PIN code while paying with Visa cards
Scientists from the Swiss Higher Technical School of Zurich have developed an attack that allows not to enter a PIN code when making contactless payments with Visa Credit, Visa Electron…
Elon Musk confirmed that the Russian offered a Tesla employee a million dollars for hacking the company
Earlier this week, the US Department of Justice announced the arrest of 27-year-old Russian named Kryuchkov Yegor Igorevich, who came to the United States on a tourist visa. According to…
Twitter and Graphika neutralized Dracula propaganda botnet
Experts from the Graphika research group talked about how they managed to find and neutralize the Dracula botnet on Twitter. It consisted of about 3,000 bots that spread pro-Chinese political…
Hackers use in attacks malicious plugin for 3Ds Max
Bitdefender experts have discovered a hacker group that is attacking companies around the world using a malicious plugin for 3Ds Max. On August 10, 2020, 3Ds Max developer Autodesk posted…
SpiKey technique allows opening the lock by recording a sound of a turning key
Scientists from the National University of Singapore have published a report on the interesting SpiKey technique that allows opening a lock. They argue that having overheard and recorded the sound…
Ukrainian cyber police in cooperation with Binance detained operators of 20 cryptocurrency exchangers
Since January 2020, the Ukrainian cyber police began cooperating with one of the world's largest cryptocurrency exchanges, Binance. The fact is that exchange experts often detect transactions that potentially are…
Microsoft developers will stop supporting classic Edge and IE 11
Microsoft said it would stop supporting classic Edge and IE 11. The company has published a schedule for the end of support for Internet Explorer 11 and Edge (a version…
Vulnerabilities in Amazon Alexa opened access to user data for outsiders
In June this year, researchers from Check Point discovered a number of dangerous vulnerabilities that opened for attacks the Amazon Alexa virtual assistant and its users. The problem was in…