Hackers Attack Ukrainian Organizations through Malicious Windows 10 Installers
Mandiant experts reported that Ukrainian government agencies are suffering from attacks using malicious Trojanized Windows 10 installers, as victims download malicious ISO files from Ukrainian and Russian-language torrent trackers (including…
Huge Ransomware List by Gridinsoft Research – Part #2
We talked a lot about notorious ransomware examples in Part #1 of this series. Still, it was not enough to reveal all noteworthy ransomware attacks. In Part #2, we will…
Huge Ransomware List by Gridinsoft Research – Part #1
Ransomware is rightfully considered one of the most dangerous types of malware. It attacks individuals and companies, creating a mess in their files and paralysing their work. And even being…
GoTrim Malware Hacks WordPress Sites
Fortinet specialists have discovered a new GoTrim malware written in Go that scans the Internet for WordPress sites and brute-forces them by guessing the administrator password. Such attacks can lead…
Android Malware. Is Malware on Android Phone Possible?
Android malware is a common name for all malicious software present in Android. This OS appears not only on phones but also on a vast majority of IoT devices. Things…
New Version of Truebot Exploits Vulnerabilities in Netwrix Auditor and Raspberry Robin Worm
Information security experts warned of an increase in the number of infections with the new version of TrueBot, primarily targeting users from Mexico, Brazil, Pakistan and the United States. According…
How Not to Stumble on Scam Websites
Every year, one in ten Americans will be victimized by a scam or fraud. The variety of online fraud has increased with the number of websites and technological advancements. It…
Hackers Stole over $2.5 million from Hackers
In the past 12 months hackers have scammed more than $2.5 million from other cybercriminals on three separate hack forums alone (Exploit, XSS and BreachForums), according to Sophos researchers. You…
Dangerous WhatsApp Scams You Should Avoid
WhatsApp scams are constantly evolving, and some are difficult to identify. However, certain methods can identify the most common red flags. Read on for information on WhatsApp scams and how…
Open-Source Cryptor Cryptonite Became a Wiper due to a Bug
Fortinet researchers studied the recently appeared open-source cryptor Cryptonite, distributed for free on GitHub. It turned out that the creator of the malware made a mistake in the code, and…
Fosshost, an Open-Source Project Hosting, Is Closing Down as Its Leader Disappeared
Volunteers of the open-source project hosting Fosshost, whose services are used by GNOME, Armbian and Debian, and the Free Software Foundation Europe (FSFE), have announced the imminent closure. The fact…
Application Bugs Allowed to Open and Start Cars Hyundai, Genesis and Others
Experts from Yuga Labs discovered vulnerabilities in mobile applications for Hyundai and Genesis vehicles. In addition, the SiriusXM smart car platform, used in cars from other manufacturers (Acura, BMW, Honda,…