Qatar obliged citizens to install “spyware” for containing COVID-19 pandemic
As part of the fight against the spread of coronavirus infection, the Qatar government has obliged citizens and residents to install special software on their mobile devices to contain the…
GitLab checked its employees: on phishing got every fifth
Recently, the GitLab platform conducted a security audit, analyzing if working from home employees are resistant to phishing attacks. As it turned out, every fifth got on phishing in GitLab:…
Avast experts accidentally got source code for GhostDNS exploit
Avast analysts suddenly got the source codes for the GhostDNS exploit. The experts got access to the source thanks to an error from an unknown hacker. GhostDNS is a set…
ZDI experts described five 0-day vulnerabilities in Windows
Researchers from the Trend Micro Zero Day Initiative (ZDI) team published information on five uncorrected 0-day vulnerabilities in Windows, four of which have high risk rate. Three zero-day vulnerabilities, which…
Experts developed a free bot detection tool on Twitter
NortonLifeLock, which appeared after Symantec sold its information security division and brand Symantec Broadcom for $10.7 billion, developed a bot detection tool on Twitter. Experts have unveiled a beta version…
Hackers cracked European supercomputers and forced them to mine cryptocurrency
In Europe were attacked super powerful computers at universities and research centers: hackers cracked European supercomputers and forced them secretly mine cryptocurrency. Reports of such incidents came from the UK,…
Mandrake malware was hiding on Google Play for more than four years
Bitdefender experts found Mandrake spyware in the official Android app store, hiding on Google Play for four years (since 2016). The malware established full control over infected devices, collected credentials,…
Ramsay malware attacks PCs, which isolated from the outside world
ESET analysts discovered the infrastructure of a previously unknown Ramsay malware with some very interesting features. Ramsay attacks and collects data from PCs, which are isolated from the outside world.…
US authorities have published the top 10 software vulnerabilities, most often exploited over the past 5 years
Cybersecurity and Infrastructure Protection Agency (CISA), part of the US Department of Homeland Security, and the Federal Bureau of Investigation (FBI) published the TOP 10 software vulnerabilities, most commonly exploited…
To the network leaked data of 33.7 million LiveJournal users
In the Telegram channel of the head of DeviceLock company Ashot Hovhannisyan, arrived information about data leak of 33.7 million users of LiveJournal (also known as LJ). The researchers reported…
Hackers attacked Swiss company Stadler that produces trains
Hackers attacked the company Stadler. A well-known Swiss train manufacturer reported about a cyberattack, during which attackers could steal data of the company and its employees. Stadler manufactures a wide…
For eight years, the Cereals botnet existed for only one purpose: it downloaded anime
The Cereals IoT botnet appeared in 2012, and reached its peak in 2015, when there were about 10,000 infected devices. All these eight years, the Cereals botnet only downloaded anime…