BlackCat Ransomware Attacks Italian University
An Italian university was hit by BlackCat this week. The hackers demand a $4.5 million ransom. BlackCat is a new, but very potent ransomware gang that carries several distinctive features…
A Bug in the System Allows Adding a new NFC Key for a Tesla Car
Austrian researcher Martin Herfurt has demonstrated a new way to steal a Tesla - for this attacker can abuse the function of adding a new NFC key, doing it unnoticed…
Difference Between Phishing and Pharming
Intruders try to keep up with the development in the digital world. The technology seeks to provide users with more effective resources, but the attackers in turn try to come…
Smishing And Vishing: Differences To Know About Phishing Attacks
You can say it has become much easier for various criminals to get to their victims and target them with different schemes. And all because of the ubiquitous internet these…
IPv4 vs IPv6: What’s the Difference?
What is IPv4 and IPv6? IP addresses allow computers and devices to communicate over the Internet. Without them, no one would know who is saying what and to whom. But…
Tips For You To Recognize Fake Hacking
Fake hacking is a provocation or hacking that presupposes and notifies that someone has hacked the system. The purpose of this attack is to deceive the user and get money…
Trojan Qbot Took Advantage of the Famous Follina Vulnerability
The researchers warned that the Qbot malware is already exploiting an unpatched zero-day vulnerability in Windows MSDT called Follina. Let me remind you that the discovery of Follina became known…
Is It Safe to Use a Password Manager in 2022?
What’s the Idea Behind Password Managers? In the cybersecurity world, everyone knows that passwords are real. It’s only in the movies hackers can effortlessly detour or hack passwords. A strong…
Dangerous Injection Attacks
Today, Injection attacks are a significant problem and top the list of vulnerabilities. There are good reasons for this. They are dangerous. Injection attacks exploit various vulnerabilities to deliver untrusted…
Chinese Hacker Group Revealed after a Decade of Undetected Espionage
The New Chinese Spying Threat Actor Identified SentinelLabs, an American cybersecurity company, has reported about a Chinese hacking group Aoqin Dragon, which has managed to conduct successful spying activities against…
Information Security Experts Told About The Linux Malware Symbiote That Is Almost Undetectable
BlackBerry and Intezer specialists spoke about the new Symbiote Linux malware that infects all running processes on compromised systems, steals credentials and provides backdoor access to its operators. Let me…
Joint Operation: SSNDOB Personal Data Darknet Market Seized
What SSNDOB Was Before Its Servers Were Seized The US Department of Justice, Internal Revenue Service, and Federal Bureau of Investigation have joined forces with law enforcement authorities in Latvia…