Steve Wozniak Sues YouTube Over Cryptocurrency Scammers
Steve Wozniak and more than ten other plaintiffs have sued YouTube over fraudulent videos advertising fake Bitcoin giveaways. The fact is that scammers are very fond of using names of…
DeepSource Developers Talked about Hacking of Their GitHub Application
A popular automated code analysis tool, DeepSource, is designed to identify vulnerabilities, bugs, and performance issues. Also, for more convenience, it has integration with GitHub, and now the DeepSource developers…
Prometei botnet uses SMB for distribution
Cisco Talos has discovered a new botnet, Prometei, which was active since March 2020 and focused on mining the Monero (XMR) cryptocurrency. The researchers note that the Prometei botnet intensively…
Google cloud services are used for phishing
Attackers, whose main goal is to steal various credentials, are increasingly turning to public cloud services to host decoy files and phishing pages. Even Google services are now being used…
REvil Operators Demand $7.5 Million Ransom from Argentine Internet Provider
Last weekend, one of Argentina's largest internet providers, Telecom Argentina, suffered from REvil (Sodinokibi) ransomware attack. Malware has infected about 18,000 computers, and now REvil operators demand $7.5 million from…
BadPower attack can set devices on fire
Chinese experts from Xuanwu Lab (research arm of Tencent) have published a report on the BadPower attack technique, which can set on fire various devices with the use of Quick…
BlackRock Trojan steals passwords and card data from 337 applications on Android OS
Researchers from ThreatFabric have published a report on the study of a new Trojan on Android OS, called BlackRock. This malware is aimed stealing data from various applications, including dating…
For RECON vulnerability appeared PoC exploit
Earlier this week, it became known that SAP engineers fixed the dangerous error CVE-2020-6287, which affects most of the company's customers and applications. The vulnerability is called RECON and for…
On July “Patch Tuesday”, only Microsoft fixed 123 vulnerabilities
As part of the July update Tuesday, Microsoft engineers fixed 123 vulnerabilities in 13 different products. Any of them was under attack. In July did not reach the record of…
Linus Torvalds approved exclusion of the terms slave, blacklist and others from the Linux kernel code
More recently, we talked that the IT community has also returned to discussing inappropriate and offensive terminology under the influence of Black Lives Matter protests that swept across the United…
NightLion hacker claims to have hacked DataViper information security company
A hacker, hiding under the pseudonym NightLion, claims that has exploded the service for monitoring and aggregating leaks DataViper and has already put on sale over 8 thousand company databases…
Analysts say that over 5 billion unique credentials can be found on the black market
Analysts at Digital Shadows have estimated that there are currently more than 15 billion stolen logins and passwords, including more than 5 billion unique credentials, on the black market (hacker…