Hacker “Tamagotchi” Flipper Zero hits Kickstarter and collects 7 times more than planned
Hacker “Tamagotchi” Flipper Zero hits Kickstarter today. It was required to raise 60,000 dollars to start production of the devices, and those who predicted failure of the project were clearly…
Ransomware attack caused Garmin’s four-day services outage
Earlier this week, manufacturer of electronics and navigation equipment Garmin suffered a cyberattack and was forced to temporarily shut down a number of services. Now the company said that ransomware…
Information security specialists disclosed details of five vulnerabilities in D-Link routers
Loginsoft experts have reported about five serious vulnerabilities found in some models of D-Link routers. Even worse, support for some vulnerable devices has already been discontinued, which means they will…
Steve Wozniak Sues YouTube Over Cryptocurrency Scammers
Steve Wozniak and more than ten other plaintiffs have sued YouTube over fraudulent videos advertising fake Bitcoin giveaways. The fact is that scammers are very fond of using names of…
DeepSource Developers Talked about Hacking of Their GitHub Application
A popular automated code analysis tool, DeepSource, is designed to identify vulnerabilities, bugs, and performance issues. Also, for more convenience, it has integration with GitHub, and now the DeepSource developers…
Prometei botnet uses SMB for distribution
Cisco Talos has discovered a new botnet, Prometei, which was active since March 2020 and focused on mining the Monero (XMR) cryptocurrency. The researchers note that the Prometei botnet intensively…
Google cloud services are used for phishing
Attackers, whose main goal is to steal various credentials, are increasingly turning to public cloud services to host decoy files and phishing pages. Even Google services are now being used…
REvil Operators Demand $7.5 Million Ransom from Argentine Internet Provider
Last weekend, one of Argentina's largest internet providers, Telecom Argentina, suffered from REvil (Sodinokibi) ransomware attack. Malware has infected about 18,000 computers, and now REvil operators demand $7.5 million from…
BadPower attack can set devices on fire
Chinese experts from Xuanwu Lab (research arm of Tencent) have published a report on the BadPower attack technique, which can set on fire various devices with the use of Quick…
BlackRock Trojan steals passwords and card data from 337 applications on Android OS
Researchers from ThreatFabric have published a report on the study of a new Trojan on Android OS, called BlackRock. This malware is aimed stealing data from various applications, including dating…
For RECON vulnerability appeared PoC exploit
Earlier this week, it became known that SAP engineers fixed the dangerous error CVE-2020-6287, which affects most of the company's customers and applications. The vulnerability is called RECON and for…
On July “Patch Tuesday”, only Microsoft fixed 123 vulnerabilities
As part of the July update Tuesday, Microsoft engineers fixed 123 vulnerabilities in 13 different products. Any of them was under attack. In July did not reach the record of…