Xhelper Trojan remains on the device even after resetting to factory settings
Xhelper malware continues to infect Android devices. Moreover, the Xhelper Trojan remains on the device even after deleting or completely resetting device to factory settings. According to Nathan Collier, Senior…
Microsoft recommends Exchange administrators to disable SMBv1
Microsoft strongly recommends administrators disable the SMBv1 protocol on Exchange servers to protect against threats that exploit its vulnerabilities. Let me remind you that Microsoft has been implementing a systematic…
Microsoft fixed 0-day vulnerability in Internet Explorer and 99 more bugs in its products
Recent February “update Tuesday” became the largest for Microsoft in a long time: within its framework were fixed almost 100 different bugs, including the 0-day vulnerability in Internet Explorer, which…
FBI warned about increase of supply chains attacks
The FBI has warned private sector companies of an active hacker campaign with the increase of supply chains attacks. Attackers seek to compromise software vendors by infecting developers with the…
Trojan Emotet is trying to spread through available Wi-Fi networks
Binary Defense analysts noticed that the new version of the Emotet Trojan behaves like a Wi-Fi worm, as it tries to spread and infect new victims through Wi-Fi networks available…
Dangerous vulnerability in Citrix software is still not resolved in 20% of companies
A month after the publication of information about a dangerous vulnerability in Citrix software that threatened 80 thousand companies in 158 countries, one fifth of companies still did not take…
Lemon Duck malware operators attack IoT vendors
TrapX Security company experts warned about a new malicious campaign. Criminals use self-spreading malware from the Lemon Duck family. The cybercrime campaign targets large manufacturers that use the Windows 7…
Dangerous vulnerabilities in WhatsApp allowed compromising millions of users
Security researcher Gal Weizman from PerimeterX disclosed technical details of a number of dangerous vulnerabilities (united under the common identifier CVE-2019-18426) found in the desktop version of the WhatsApp messenger.…
Cybercriminals increasingly use pirated software to deliver backdoors and ransomware
Cybersecurity experts once again warn that while pursuing for free games and applications, users face the risk of installing a malicious program that may collect all passwords in the system…
Winnti hacking group attacked Hong Kong universities
ESET experts found that during protests that began back in March 2019, Winnti attacked two unnamed Hong Kong universities. The attacks were detected in November 2019 and began with the…
US authorities can hack iPhone, but may have difficulties with Android
Although the US authorities are persistent in waging a “cryptographic war” with technology companies, demanding weakening of encryption, they already have technical tools for cracking any phone. For example, US…
IS specialists studied working methods of the REvil (Sodinokibi) ransomware operators
Information security specialists of the Danish provider KPN applied sinkholing to REvil (Sodinokibi) cryptographic servers and studied the working methods of one of the largest ransomware threats today. Recall that…