The researcher found that every 142nd password is “123456”
Ata Hakçıl, a Turkish student and independent researcher, has done a great job examining over a billion different usernames and passwords. The researcher found that every 142nd password is “123456”.…
US cyber command warned about dangerous vulnerability in PAN-OS
The US cyber command warned that in PAN-OS was discovered a dangerous vulnerability and that soon government hack groups are likely to start using it. PAN-OS is an operating system…
Check Point: hackers exploit BLM theme for attacks
Check Point analysts reported that hackers are actively exploiting the BLM (Black Lives Matter) theme for attacks and noted increase in the activity of cybercriminals, connecting it with weakening of…
Lucifer malware uses many exploits, is engaged in mining and DDoS attacks
Palo Alto Networks experts have prepared a report on Lucifer malware, which uses many exploits and, according to experts, "wreaks havoc" on Windows hosts. It is noted that the authors…
Evil Corp returns to criminal activity with WastedLocker ransomware
Fox-IT experts talked about the latest activity of the famous hacker group Evil Corp. According to analysts, the group came back to life in January of this year and conducted…
Hackers force users to solve CAPTCHA
Microsoft analysts have discovered a malicious campaign, in which hackers force users to solve CAPTCHA before they gain access to malicious content in an Excel document. This file contains macros…
AMD plans to fix SMM Callout bugs in its processors by the end of June
AMD reports that firmware updates will be released for three bugs called SMM Callout by the end of June 2020. These vulnerabilities allow attackers to establish control over the AMD…
eBay employees organized persecution and intimidation of a family of bloggers
Six former eBay employees became involved in a strange trial. According to the investigation, eBay employees organized the persecution and intimidation of a couple of bloggers from the city of…
Experts discovered Chrome largest spyware installation campaign
Specialists from the company Awake Security reported about currently perhaps the largest spyware campaign for installing spyware in Google Chrome. As part of the campaign, criminals registered thousands of domains…
Vulnerabilities in old GTP protocol could affect 4G and 5G networks
Experts cautioned that vulnerabilities in the old GTP (GPRS Tunneling Protocol) could quite seriously affect the operation of 4G and 5G networks. In reports published last week and in December…
GitHub will replace the term “master” with a more neutral one
Nat Friedman, leading GitHub after acquiring Microsoft in 2018, said on Twitter that GitHub will replace the term “master” with a more neutral synonymous. For example, main, to avoid unnecessary…
Italian IT company CloudEyE collaborated with ransomware operators
For about four years, the Italian company CloudEyE was engaged in a seemingly legal business, offering protection of binaries from reverse engineering for Windows applications, however, at the same time,…