Developer of CodeRAT Trojan Releases Source Code
The source code for the CodeRAT remote access trojan has been published on GitHub. This happened after the security researchers identified the malware developer and called him to account because…
Cisco Hack Is Linked to Russian-Speaking Hackers from Evil Corp
Experts from eSentire established that the infrastructure used to hack Cisco in May 2022 was exploited to compromise an unnamed HR solutions company a month earlier. Researchers believe that malicious…
The Japanese Government Decided to Fight the Use of … Floppy Disks
As it turns out, more than 1,900 administrative procedures in Japan still require the use of floppy disks. Now, the newly appointed head of Japan's Ministry of Digital Reform, Taro…
All About Hacker Motivation: Why Do Hackers Hack?
Usually, hackers hack for monetary gain. However, there are less apparent reasons lurking beneath the surface. But knowledge of technology is not enough to be a successful hacker. You also…
Malware Hides in Images from the James Webb Telescope
Securonix researchers have noticed an interesting malware campaign that distributes a malware called GO#WEBBFUSCATOR written in Go. Hackers use phishing emails, malicious documents, and images from the James Webb telescope…
Hackers Are Now More Likely to Attack Not Large Hospitals, but Specialized Clinics
According to a new report from Critical Insight, hackers are increasingly targeting small healthcare companies and specialized clinics that lack the resources to defend themselves. While large healthcare systems, even…
Hidden Scams: Could QR Code Actually Be a Phishing Attack?
Although QR codes have been around for more than 25 years, their use in everyday life has increased dramatically since the pandemic began. But is it always safe to scan…
The LockBit Group Is Taking on DDoS Attacks
Last week, after the information security company Entrust was hacked, the LockBit hacker group was subjected to powerful DDoS attacks. Now the hackers say they have improved DDoS protection and…
Black Hat SEO: Is Someone Phishing With Your Site Domain?
Search engine optimization (SEO) is a process of optimization and upgrading of websites to improve the ranking of search engine results pages and to attract traffic. Among other things, SEO…
Genshin Impact Game’s Anti-Cheat Driver Is Used to Disable Antiviruses
Trend Micro experts have discovered that hackers are abusing the system anti-cheat driver of the popular game Genshin Impact to disable anti-virus software during ransomware attacks. Mhypro2.sys gives access to…
Experts Demonstrate Data Extraction Using LEDs and a Gyroscope
This week, researchers have demonstrated two interesting ways to extract data from machines that are physically isolated from any networks and potentially dangerous peripherals at once. The GAIROSCOPE method suggests…
iOS VPN Bug Prevents Encryption of Traffic for Years, Researchers Say
A few years ago, engineers at Proton Technologies, the company behind ProtonMail and ProtonVPN, talked about a bug in iOS 13.3.1 that prevents VPN apps from encryption of all traffic.…