295 Chrome extensions injected ads in search results
AdGuard analysts have identified 295 malicious extensions in the Chrome Web Store that have been installed over 80,000,000 times. These Chrome browser extensions injected ads into Google and Bing search…
Google: 11 0-day vulnerabilities identified in the first half of 2020
Google Project Zero experts estimate that 11 0-day vulnerabilities, actively exploited by hackers, were identified in the first half of 2020. The current number of 0-day problems indicates that, most…
Media Reports that Garmin Paid Ransom to WastedLocker Malware Operators
In July 2020, Garmin, the manufacturer of wearable electronics and navigation equipment, suffered from a cyberattack and was forced to temporarily shut down a number of services. Now there is…
Attacks on EMV cards, which were only a theory for 12 years, noticed in reality
Experts from the Gemini Advisory company published a report, according to which on underground hacker forums were found two precedents, when hackers collected EMV card data and put this information…
Hacker “Tamagotchi” Flipper Zero hits Kickstarter and collects 7 times more than planned
Hacker “Tamagotchi” Flipper Zero hits Kickstarter today. It was required to raise 60,000 dollars to start production of the devices, and those who predicted failure of the project were clearly…
Ransomware attack caused Garmin’s four-day services outage
Earlier this week, manufacturer of electronics and navigation equipment Garmin suffered a cyberattack and was forced to temporarily shut down a number of services. Now the company said that ransomware…
Information security specialists disclosed details of five vulnerabilities in D-Link routers
Loginsoft experts have reported about five serious vulnerabilities found in some models of D-Link routers. Even worse, support for some vulnerable devices has already been discontinued, which means they will…
Steve Wozniak Sues YouTube Over Cryptocurrency Scammers
Steve Wozniak and more than ten other plaintiffs have sued YouTube over fraudulent videos advertising fake Bitcoin giveaways. The fact is that scammers are very fond of using names of…
DeepSource Developers Talked about Hacking of Their GitHub Application
A popular automated code analysis tool, DeepSource, is designed to identify vulnerabilities, bugs, and performance issues. Also, for more convenience, it has integration with GitHub, and now the DeepSource developers…
Prometei botnet uses SMB for distribution
Cisco Talos has discovered a new botnet, Prometei, which was active since March 2020 and focused on mining the Monero (XMR) cryptocurrency. The researchers note that the Prometei botnet intensively…
Google cloud services are used for phishing
Attackers, whose main goal is to steal various credentials, are increasingly turning to public cloud services to host decoy files and phishing pages. Even Google services are now being used…
REvil Operators Demand $7.5 Million Ransom from Argentine Internet Provider
Last weekend, one of Argentina's largest internet providers, Telecom Argentina, suffered from REvil (Sodinokibi) ransomware attack. Malware has infected about 18,000 computers, and now REvil operators demand $7.5 million from…