Common Cryptocurrency Scams and Frauds: How to Avoid
Fraudsters do not stand still and are always looking for new ways to steal money. Unfortunately, the massive growth of cryptocurrency in recent years has created the perfect ground for…
Fargo Ransomware aims at vulnerable Microsoft SQL servers
Ransomware rarely chooses the sole type of targets for their attacks. They roam from attacks on small coffee shops to strikes on governmental organisations, with the corresponding adaptations to their…
Hack Group Witchetty Hides Malware in the Windows Logo
Symantec researchers have discovered a malicious campaign by the hacker group Witchetty, which uses steganography to hide malware in an image with the Windows logo. Let me remind you that…
TikTok Scams Stealing Money And Data. Beware!
TikTok has become a popular social network with over a billion registered users. According to statistics, each user spends about 95 minutes daily on this platform. Such an extensive social…
Hack Group Bl00Dy Is Already Using Leaked LockBit Builder
Researchers have discovered that the young ransomware group Bl00Dy is already using in its attacks the LockBit builder, which leaked to the network last week. Let me remind you that…
Lazarus Hackers Attack MacOS Users by impersonating Crypto[.]com
Sentinel One has discovered that the North Korean hacker group Lazarus is targeting macOS users selectively. Attackers are using fake Cryptocom jobs to hack developers and digital artists in the…
Ukrainian Law Enforcers Arrested Hackers Who Sold More Than 30 million Accounts
Ukrainian law enforcers reported that they “neutralized” and arrested hackers from a cybercriminal group operating from Lviv. The group specialized in the sale of accounts and sold more than 30…
Scammers Use Fake Dating Sites to Steal Money
Experts from ReasonLabs have discovered an unusual malicious scheme that has been operating since 2019 - carders used fake dating sites to steal and launder funds. Also read our article:…
Trackid=sp-006 — What is this thing?
Cookie tracking is a kind of network activity on the server side that is considered potentially dangerous. Trackid=sp-006 is an example of a malicious cookie tracker that spoofs the search…
Hackers Use CircleCI Fake Notifications to Access GitHub Accounts
GitHub warns that a large-scale phishing campaign aimed at users began on September 16: scammers send emails with fake notifications on behalf of the Circle CI service, which is used…
Signs of Identity Theft: How to Prevent It?
Identity theft is a rather unpleasant crime. Cybercriminals can not only empty your wallet but also stalk your digital space and may even use it to commit crimes on your…
LockBit 3.0 Builder leaked to the public
On September 21, 2022, a new Twitter user Ali Qushji published what is supposed to be a LockBit Ransomware builder. According to what the user says, this application is for…