Microsoft fixed 0-day vulnerability in Internet Explorer and 99 more bugs in its products
Recent February “update Tuesday” became the largest for Microsoft in a long time: within its framework were fixed almost 100 different bugs, including the 0-day vulnerability in Internet Explorer, which…
FBI warned about increase of supply chains attacks
The FBI has warned private sector companies of an active hacker campaign with the increase of supply chains attacks. Attackers seek to compromise software vendors by infecting developers with the…
Trojan Emotet is trying to spread through available Wi-Fi networks
Binary Defense analysts noticed that the new version of the Emotet Trojan behaves like a Wi-Fi worm, as it tries to spread and infect new victims through Wi-Fi networks available…
Dangerous vulnerability in Citrix software is still not resolved in 20% of companies
A month after the publication of information about a dangerous vulnerability in Citrix software that threatened 80 thousand companies in 158 countries, one fifth of companies still did not take…
Lemon Duck malware operators attack IoT vendors
TrapX Security company experts warned about a new malicious campaign. Criminals use self-spreading malware from the Lemon Duck family. The cybercrime campaign targets large manufacturers that use the Windows 7…
Dangerous vulnerabilities in WhatsApp allowed compromising millions of users
Security researcher Gal Weizman from PerimeterX disclosed technical details of a number of dangerous vulnerabilities (united under the common identifier CVE-2019-18426) found in the desktop version of the WhatsApp messenger.…
Cybercriminals increasingly use pirated software to deliver backdoors and ransomware
Cybersecurity experts once again warn that while pursuing for free games and applications, users face the risk of installing a malicious program that may collect all passwords in the system…
Winnti hacking group attacked Hong Kong universities
ESET experts found that during protests that began back in March 2019, Winnti attacked two unnamed Hong Kong universities. The attacks were detected in November 2019 and began with the…
US authorities can hack iPhone, but may have difficulties with Android
Although the US authorities are persistent in waging a “cryptographic war” with technology companies, demanding weakening of encryption, they already have technical tools for cracking any phone. For example, US…
IS specialists studied working methods of the REvil (Sodinokibi) ransomware operators
Information security specialists of the Danish provider KPN applied sinkholing to REvil (Sodinokibi) cryptographic servers and studied the working methods of one of the largest ransomware threats today. Recall that…
97 of the 100 largest airports use vulnerable sites and web applications
Specialists from the Swiss company ImmuniWeb conducted an analysis of the cybersecurity level of the 100 world's largest airports (in Asia, Europe, North America, Australia, Africa and South America). According…
Free Software Foundation encourages Microsoft to open Windows 7 source code
Admit that are you already tired of the news about Windows 7. Let it finally rest in peace. However, it’s hard to ignore that Microsoft, under pressure of the public…