Cybercriminals started using Google services more often in phishing campaigns
Security researchers have reported an increase in cyberattacks using Google services in phishing campaigns, as a tool to bypass security and steal credentials, credit cards, and other personal information. The…
Though 2020 is ending, the list of worst passwords is still topes “123456”
The end of the year is approaching, and the developers of the password manager NordPass have once again published a list of the most popular and weak passwords of 2020.…
Chrome 87 Fixed NAT Slipstream Vulnerability and Disabled FTP Support
Google engineers introduced Chrome 87, in which was disabled FTP support. The new version of the browser is already available for users of Windows, Mac, Linux, Chrome OS, Android and…
VoltPillager attack compromises Intel SGX
A group of researchers from the University of Birmingham have demonstrated the VoltPillager attack, which can violate the confidentiality and integrity of data in Intel SGX enclaves. To implement this,…
Microsoft accused Russia and North Korea of attacks on pharmaceutical companies
Microsoft representatives accused Russia and North Korea of attacks on pharmaceutical companies. They reported that, according to their data, in recent months, three APT groups have attacked at least seven…
CostaRicto mercenary hackers target financial institutions around the world
BlackBerry experts told about the discovery of a group of mercenary hackers called CostaRicto. This is the fifth group of mercenary hackers identified by experts this year. So, back in…
Microsoft urges users to opt out of multi-factor authentication via phone
Microsoft experts have once again raised the issue of the insecurity of multi-factor authentication through the phone, that is, through one-time codes in SMS messages or voice calls. Instead, the…
Platypus attack allows stealing data from Intel processors
A group of scientists from the Technical University of Graz (Austria), the University of Birmingham, and the Helmholtz Center for Information Security in Germany (CISPA) have revealed details of a…
New Pay2Key ransomware encrypts corporate networks in just an hour
A number of companies and large corporations in Israel have been targeted by cyberattacks using a new ransomware called Pay2Key. The first attacks were recorded by specialists from Check Point…
The company had to change the dangerous name for sites as it could provoke an XSS attack
The name of the some company turned out to be dangerous for sites that cannot properly process HTML and could provoke an XSS attack. In the past, some organizations have…
Ragnar Locker ransomware attacked Italian beverage manufacturer Gruppo Campari
ZDNet reports that on November 1, 2020, Ragnar Locker ransomware operators attacked the Italian beverage manufacturer Gruppo Campari, which owns such brands as Campari, Cinzano, SKYY vodka, Epsolon, Wild Turkey,…
Ransomwares doesn’t always delete stolen data after paying the ransom
Researchers from Coveware have provided statistics that ransomwares does not always delete the data it have stolen and made recommendations to potential victims. In 2019, Maze ransomware operators began using…