Hack Group Bl00Dy Is Already Using Leaked LockBit Builder
Researchers have discovered that the young ransomware group Bl00Dy is already using in its attacks the LockBit builder, which leaked to the network last week. Let me remind you that…
Lazarus Hackers Attack MacOS Users by impersonating Crypto[.]com
Sentinel One has discovered that the North Korean hacker group Lazarus is targeting macOS users selectively. Attackers are using fake Cryptocom jobs to hack developers and digital artists in the…
Ukrainian Law Enforcers Arrested Hackers Who Sold More Than 30 million Accounts
Ukrainian law enforcers reported that they “neutralized” and arrested hackers from a cybercriminal group operating from Lviv. The group specialized in the sale of accounts and sold more than 30…
Scammers Use Fake Dating Sites to Steal Money
Experts from ReasonLabs have discovered an unusual malicious scheme that has been operating since 2019 - carders used fake dating sites to steal and launder funds. Also read our article:…
Trackid=sp-006 — What is this thing?
Cookie tracking is a kind of network activity on the server side that is considered potentially dangerous. Trackid=sp-006 is an example of a malicious cookie tracker that spoofs the search…
Hackers Use CircleCI Fake Notifications to Access GitHub Accounts
GitHub warns that a large-scale phishing campaign aimed at users began on September 16: scammers send emails with fake notifications on behalf of the Circle CI service, which is used…
Signs of Identity Theft: How to Prevent It?
Identity theft is a rather unpleasant crime. Cybercriminals can not only empty your wallet but also stalk your digital space and may even use it to commit crimes on your…
LockBit 3.0 Builder leaked to the public
On September 21, 2022, a new Twitter user Ali Qushji published what is supposed to be a LockBit Ransomware builder. According to what the user says, this application is for…
Pegasus Spyware — The Most Dangerous Malware
Pegasus Spyware is a malicious program that is covered with multiple layers of secrets, rumours and false claims. That military-grade malware is something like a legend, that sometimes makes people…
Top Working Antispyware Tips 2022
The user risks being compromised by using the Internet. The intruders are still trying to hijack your confidential data and credit card numbers, distribute spyware, and the like. With each…
What to Do if A Scammer Has Your Email Address?
Scammers usually hack into email accounts to send fake messages from a trusted address, making recipients fall for their tricks. For example, to get them to send money, transmit personal…
Gamaredon Hack Group Uses New Malware to Attack Ukrainian Organizations
Cisco Talos analysts write that the Russian-speaking hack group Gamaredon (aka Primitive Bear, Shuckworm, IronTiden and Callisto) is attacking Ukrainian organizations with the help of a new infostealer. The targets…