Russian DDOSIA Project Pays Volunteers to Participate in DDOS Attacks on Western Companies
Radware experts discovered the DDOSIA crowdsourcing DDoS project, in which a Russian-speaking hack group pays volunteers for participation in attacks on Western organizations. Let me remind you that we also…
Another 0-Day Bug Was Found in Microsoft Exchange, and LockBit Ransomware Operators Are Exploiting It
Although Microsoft still hasn't fixed the ProxyNotShell vulnerabilities found in Exchange last month, the company is now investigating a report of a new 0-day bug that is being used to…
“Get Rich With Bitcoin” Instagram Bitcoin Scams
Instagram is a vast social network with over a billion active users. Fraudsters do not miss the chance to develop clever schemes on this platform, to deceive users and steal…
Fake Sites for Adults Destroy User Data
Experts from the Cyble company have discovered a number of fake adult sites that distribute ransomware. However, a detailed analysis showed that this malware does not encrypt data, but deliberately…
Meta Finds over 400 Chinese Apps That Stole Data from 1 million Users
Meta has sued several Chinese companies (including HeyMods, Highlight Mobi and HeyWhatsApp) for developing and using "unofficial" WhatsApp apps for Android. The fact is that since May 2022, these applications…
How to Access the Dark Web Safely: Useful Tips for the Darknet
Is the dark web legal? Despite Darknet's association with illegal activity, accessing and browsing the dark web is legal. However, most Darknet websites are used for criminal activities - such…
Hacker Group XDSpy Distributes Malware in Russia under the Guise of Subpoenas for the Army
In early October, Kaspersky Lab experts recorded a targeted attack on Russian organizations: attackers from the XDSpy hacker group sent several hundred malicious emails allegedly related to the topic of…
Hundreds of Microsoft SQL Servers Infected with Maggie Backdoor
Security researchers have discovered a new malware that targets Microsoft SQL servers. The backdoor is dubbed Maggie, has already infected hundreds of machines around the world. The greatest distribution of…
Ferrari Has So Far Denied If It Attacked by Ransomware
Sports and racing car maker Ferrari persistently denies it was ransacked. At the same time, the RansomEXX hack group added the automaker to the list of its victims and claims…
Why Phishing is Still the Most Common Cyber Attack?
Unfortunately, millions of users worldwide are at risk every single day. Statistics show that a successful phishing attack occurs every 30 seconds, suggesting cybercriminals don't stand still and evolve as…
Hackers Compromise Comm100 Live Chat to Attack a Supply Chain
The official installer of the Comm100 Live Chat SaaS application, which is widely used by companies to communicate with customers and website visitors, has been infected with a Trojan. The…
Most Common Types of Social Engineering Attacks
Intruders are developing more and more methods to get what they want. Social engineering is one of the most common methods through which fraudsters manage to deceive the user, manipulate…