Hackers Compromise Comm100 Live Chat to Attack a Supply Chain
The official installer of the Comm100 Live Chat SaaS application, which is widely used by companies to communicate with customers and website visitors, has been infected with a Trojan. The…
Most Common Types of Social Engineering Attacks
Intruders are developing more and more methods to get what they want. Social engineering is one of the most common methods through which fraudsters manage to deceive the user, manipulate…
Judge Sentences Former eBay Executives to Jail Terms for Harassing Bloggers
Last week, two former eBay executives were sentenced to prison terms for harassing a blogger couple who posted unflattering articles about eBay, which irritated the heads of the online auction…
Cryptocurrency Scams in 2025: The AI-Powered Evolution of Digital Theft
The cryptocurrency landscape has transformed dramatically in recent years, but so have the scams targeting unsuspecting investors. In March 2025 alone, over $124 million was stolen across 25 separate crypto…
Fargo Ransomware aims at vulnerable Microsoft SQL servers
Ransomware rarely chooses the sole type of targets for their attacks. They roam from attacks on small coffee shops to strikes on governmental organisations, with the corresponding adaptations to their…
Hack Group Witchetty Hides Malware in the Windows Logo
Symantec researchers have discovered a malicious campaign by the hacker group Witchetty, which uses steganography to hide malware in an image with the Windows logo. Let me remind you that…
TikTok Scams Stealing Money And Data. Beware!
TikTok has become a popular social network with over a billion registered users. According to statistics, each user spends about 95 minutes daily on this platform. Such an extensive social…
Hack Group Bl00Dy Is Already Using Leaked LockBit Builder
Researchers have discovered that the young ransomware group Bl00Dy is already using in its attacks the LockBit builder, which leaked to the network last week. Let me remind you that…
Lazarus Hackers Attack MacOS Users by impersonating Crypto[.]com
Sentinel One has discovered that the North Korean hacker group Lazarus is targeting macOS users selectively. Attackers are using fake Cryptocom jobs to hack developers and digital artists in the…
Ukrainian Law Enforcers Arrested Hackers Who Sold More Than 30 million Accounts
Ukrainian law enforcers reported that they “neutralized” and arrested hackers from a cybercriminal group operating from Lviv. The group specialized in the sale of accounts and sold more than 30…
Scammers Use Fake Dating Sites to Steal Money
Experts from ReasonLabs have discovered an unusual malicious scheme that has been operating since 2019 - carders used fake dating sites to steal and launder funds. Also read our article:…
Trackid=sp-006 — What is this thing?
Cookie tracking is a kind of network activity on the server side that is considered potentially dangerous. Trackid=sp-006 is an example of a malicious cookie tracker that spoofs the search…