Spyware vs. Stalkerware: What’s the difference?
Fraudsters develop various methods to penetrate the property of others, so there are different types of attacks and threats. In this article, we will look at what spyware and stalkerware…
Police Swindle Decryption Keys from DeadBolt Ransomware Gang
The Dutch National Police, together with information security specialists from RespondersNU, tricked the operators of the DeadBolt encryptor into giving them 155 keys to decrypt data. For this, the experts…
What is Torrenting? Is it illegal or Safe? How Does it Work
A torrent is a tool for free data exchange on the Internet. However, it is considered a symbol of piracy and copyright infringement. The term "torrent" in online communities is…
Russian DDOSIA Project Pays Volunteers to Participate in DDOS Attacks on Western Companies
Radware experts discovered the DDOSIA crowdsourcing DDoS project, in which a Russian-speaking hack group pays volunteers for participation in attacks on Western organizations. Let me remind you that we also…
Another 0-Day Bug Was Found in Microsoft Exchange, and LockBit Ransomware Operators Are Exploiting It
Although Microsoft still hasn't fixed the ProxyNotShell vulnerabilities found in Exchange last month, the company is now investigating a report of a new 0-day bug that is being used to…
“Get Rich With Bitcoin” Instagram Bitcoin Scams
Instagram is a vast social network with over a billion active users. Fraudsters do not miss the chance to develop clever schemes on this platform, to deceive users and steal…
Fake Sites for Adults Destroy User Data
Experts from the Cyble company have discovered a number of fake adult sites that distribute ransomware. However, a detailed analysis showed that this malware does not encrypt data, but deliberately…
Meta Finds over 400 Chinese Apps That Stole Data from 1 million Users
Meta has sued several Chinese companies (including HeyMods, Highlight Mobi and HeyWhatsApp) for developing and using "unofficial" WhatsApp apps for Android. The fact is that since May 2022, these applications…
How to Access the Dark Web Safely: Useful Tips for the Darknet
Is the dark web legal? Despite Darknet's association with illegal activity, accessing and browsing the dark web is legal. However, most Darknet websites are used for criminal activities - such…
Hacker Group XDSpy Distributes Malware in Russia under the Guise of Subpoenas for the Army
In early October, Kaspersky Lab experts recorded a targeted attack on Russian organizations: attackers from the XDSpy hacker group sent several hundred malicious emails allegedly related to the topic of…
Hundreds of Microsoft SQL Servers Infected with Maggie Backdoor
Security researchers have discovered a new malware that targets Microsoft SQL servers. The backdoor is dubbed Maggie, has already infected hundreds of machines around the world. The greatest distribution of…
Ferrari Has So Far Denied If It Attacked by Ransomware
Sports and racing car maker Ferrari persistently denies it was ransacked. At the same time, the RansomEXX hack group added the automaker to the list of its victims and claims…