Amazon Email Phishing: How to Protect Yourself?
Amazon email phishing is yet another form of email fraud that parasites on the name of a legit company. As the company operates in different industries, hackers forge their messages…
New Vulnerability in Apache Commons Text Is Already Being Attacked by Hackers
According to WordPress security firm Defiant, attempts have already been made to exploit a new vulnerability in Apache Commons Text (CVE-2022-42889). Called Text4Shell and affects versions 1.5 to 1.9 of…
Researchers Linked Ransom Cartel members to Famous Hack Group REvil
Experts from the Palo Alto Network analysed the Ransom Cartel hacker group's ransomware and believe that it is very similar to the REvil malware. Although there is no conclusive evidence…
Safari Can’t Establish a Secure Connection Error
The "Safari Can’t Establish a Secure Connection" error message appears when browsing the web on a Mac. It may be met by anyone during their daily routine browsing. These messages…
New PowerShell Backdoor Masquerades as a Windows Update
Cybersecurity experts from SafeBreach have found a new, previously undocumented and "undetectable" PowerShell backdoor, which hackers actively use and has been used to attack at least 69 targets. Let me…
Weak Block Cipher in Microsoft Office 365 Leads to Message Content Disclosure
WithSecure (formerly F-Secure Business) researchers claim that the content of encrypted messages sent through Microsoft Office 365 can be partially or completely disclosed due to the use of a weak…
Spyware vs. Stalkerware: What’s the difference?
Fraudsters develop various methods to penetrate the property of others, so there are different types of attacks and threats. In this article, we will look at what spyware and stalkerware…
Police Swindle Decryption Keys from DeadBolt Ransomware Gang
The Dutch National Police, together with information security specialists from RespondersNU, tricked the operators of the DeadBolt encryptor into giving them 155 keys to decrypt data. For this, the experts…
What is Torrenting? Is it illegal or Safe? How Does it Work
A torrent is a tool for free data exchange on the Internet. However, it is considered a symbol of piracy and copyright infringement. The term "torrent" in online communities is…
Russian DDOSIA Project Pays Volunteers to Participate in DDOS Attacks on Western Companies
Radware experts discovered the DDOSIA crowdsourcing DDoS project, in which a Russian-speaking hack group pays volunteers for participation in attacks on Western organizations. Let me remind you that we also…
Another 0-Day Bug Was Found in Microsoft Exchange, and LockBit Ransomware Operators Are Exploiting It
Although Microsoft still hasn't fixed the ProxyNotShell vulnerabilities found in Exchange last month, the company is now investigating a report of a new 0-day bug that is being used to…
“Get Rich With Bitcoin” Instagram Bitcoin Scams
Instagram is a vast social network with over a billion active users. Fraudsters do not miss the chance to develop clever schemes on this platform, to deceive users and steal…