Intel engineers fixed critical bug in AMT and ISM
Intel engineers fixed this week a critical bug with updates to Active Management Technology (AMT) and Intel Standard Manageability (ISM). The AMT and ISM bug was one of the most…
Hackers use legitimate Weave Scope tool in attacks on cloud environments
Intezer experts discovered the TeamTNT cybercriminal group, whose hackers use the legitimate Weave Scope tool in their attacks to visualize and monitor cloud infrastructure. According to the researchers, this is…
Researcher Earned $10,000 by Finding XSS Vulnerability in Google Maps
Israeli cybersecurity specialist Zohar Shachar talked about his discovery of XSS vulnerability in Google Maps in 2019, and then found out that Google was unable to fix it from the…
SWIFT says money is rarely laundered with cryptocurrencies
Specialists of the SWIFT organization, which operates same-named international system or the transfer of financial information, published a report on various money laundering techniques. As it turned out, money is…
Hackers use .NET library for creating malicious Excel files
Researchers at NVISO Labs noticed that the Epic Manchego group uses unusual Excel files for attacks, created specifically to bypass defense mechanisms. The fact is that these files are not…
Magecart groupings extract stolen cards data via Telegram
An information security specialist known under the pseudonym Affable Kraut discovered that Magecart web skimmer operators extract stolen cards data through Telegram channels. He concluded this based on information obtained…
Ukraine’s largest IT company SoftServe has been attacked by a ransomware
One of the largest IT companies in Ukraine, SoftServe (number 2 in the latest DOU.UA rating), was attacked by a ransomware. A number of the company's services stopped working, according…
KryptoCibule malware steals cryptocurrency from Windows users
ESET specialists discovered the KryptoCibule malware, which has been active since 2018 and steals cryptocurrency from Windows users in the Czech Republic and Slovakia (these countries accounted for 85% of…
Shlayer malware bypassed Apple security checks
Security expert Peter Dantini discovered that the Shlayer malware bypassed Apple's checks: it successfully passed the software notarization process and could run on any Mac running macOS Catalina and newer.…
Scientists have developed an attack that allows not to enter a PIN code while paying with Visa cards
Scientists from the Swiss Higher Technical School of Zurich have developed an attack that allows not to enter a PIN code when making contactless payments with Visa Credit, Visa Electron…
Elon Musk confirmed that the Russian offered a Tesla employee a million dollars for hacking the company
Earlier this week, the US Department of Justice announced the arrest of 27-year-old Russian named Kryuchkov Yegor Igorevich, who came to the United States on a tourist visa. According to…
Twitter and Graphika neutralized Dracula propaganda botnet
Experts from the Graphika research group talked about how they managed to find and neutralize the Dracula botnet on Twitter. It consisted of about 3,000 bots that spread pro-Chinese political…