Meta Finds over 400 Chinese Apps That Stole Data from 1 million Users
Meta has sued several Chinese companies (including HeyMods, Highlight Mobi and HeyWhatsApp) for developing and using "unofficial" WhatsApp apps for Android. The fact is that since May 2022, these applications…
How to Access the Dark Web Safely: Useful Tips for the Darknet
Is the dark web legal? Despite Darknet's association with illegal activity, accessing and browsing the dark web is legal. However, most Darknet websites are used for criminal activities - such…
Hacker Group XDSpy Distributes Malware in Russia under the Guise of Subpoenas for the Army
In early October, Kaspersky Lab experts recorded a targeted attack on Russian organizations: attackers from the XDSpy hacker group sent several hundred malicious emails allegedly related to the topic of…
Hundreds of Microsoft SQL Servers Infected with Maggie Backdoor
Security researchers have discovered a new malware that targets Microsoft SQL servers. The backdoor is dubbed Maggie, has already infected hundreds of machines around the world. The greatest distribution of…
Ferrari Has So Far Denied If It Attacked by Ransomware
Sports and racing car maker Ferrari persistently denies it was ransacked. At the same time, the RansomEXX hack group added the automaker to the list of its victims and claims…
Why Phishing is Still the Most Common Cyber Attack?
Unfortunately, millions of users worldwide are at risk every single day. Statistics show that a successful phishing attack occurs every 30 seconds, suggesting cybercriminals don't stand still and evolve as…
Hackers Compromise Comm100 Live Chat to Attack a Supply Chain
The official installer of the Comm100 Live Chat SaaS application, which is widely used by companies to communicate with customers and website visitors, has been infected with a Trojan. The…
Most Common Types of Social Engineering Attacks
Intruders are developing more and more methods to get what they want. Social engineering is one of the most common methods through which fraudsters manage to deceive the user, manipulate…
Judge Sentences Former eBay Executives to Jail Terms for Harassing Bloggers
Last week, two former eBay executives were sentenced to prison terms for harassing a blogger couple who posted unflattering articles about eBay, which irritated the heads of the online auction…
Common Cryptocurrency Scams and Frauds: How to Avoid
Fraudsters do not stand still and are always looking for new ways to steal money. Unfortunately, the massive growth of cryptocurrency in recent years has created the perfect ground for…
Fargo Ransomware aims at vulnerable Microsoft SQL servers
Ransomware rarely chooses the sole type of targets for their attacks. They roam from attacks on small coffee shops to strikes on governmental organisations, with the corresponding adaptations to their…
Hack Group Witchetty Hides Malware in the Windows Logo
Symantec researchers have discovered a malicious campaign by the hacker group Witchetty, which uses steganography to hide malware in an image with the Windows logo. Let me remind you that…