The Japanese Government Decided to Fight the Use of … Floppy Disks
As it turns out, more than 1,900 administrative procedures in Japan still require the use of floppy disks. Now, the newly appointed head of Japan's Ministry of Digital Reform, Taro…
All About Hacker Motivation: Why Do Hackers Hack?
Usually, hackers hack for monetary gain. However, there are less apparent reasons lurking beneath the surface. But knowledge of technology is not enough to be a successful hacker. You also…
Malware Hides in Images from the James Webb Telescope
Securonix researchers have noticed an interesting malware campaign that distributes a malware called GO#WEBBFUSCATOR written in Go. Hackers use phishing emails, malicious documents, and images from the James Webb telescope…
Hackers Are Now More Likely to Attack Not Large Hospitals, but Specialized Clinics
According to a new report from Critical Insight, hackers are increasingly targeting small healthcare companies and specialized clinics that lack the resources to defend themselves. While large healthcare systems, even…
Hidden Scams: Could QR Code Actually Be a Phishing Attack?
Although QR codes have been around for more than 25 years, their use in everyday life has increased dramatically since the pandemic began. But is it always safe to scan…
The LockBit Group Is Taking on DDoS Attacks
Last week, after the information security company Entrust was hacked, the LockBit hacker group was subjected to powerful DDoS attacks. Now the hackers say they have improved DDoS protection and…
Black Hat SEO: Is Someone Phishing With Your Site Domain?
Search engine optimization (SEO) is a process of optimization and upgrading of websites to improve the ranking of search engine results pages and to attract traffic. Among other things, SEO…
Genshin Impact Game’s Anti-Cheat Driver Is Used to Disable Antiviruses
Trend Micro experts have discovered that hackers are abusing the system anti-cheat driver of the popular game Genshin Impact to disable anti-virus software during ransomware attacks. Mhypro2.sys gives access to…
Experts Demonstrate Data Extraction Using LEDs and a Gyroscope
This week, researchers have demonstrated two interesting ways to extract data from machines that are physically isolated from any networks and potentially dangerous peripherals at once. The GAIROSCOPE method suggests…
iOS VPN Bug Prevents Encryption of Traffic for Years, Researchers Say
A few years ago, engineers at Proton Technologies, the company behind ProtonMail and ProtonVPN, talked about a bug in iOS 13.3.1 that prevents VPN apps from encryption of all traffic.…
Remote working tips: Key Aspects of Secure Remote Access
After the pandemic, work-from-home jobs became much more common around the world. Many predict that even after the pandemic subsides, remote work will remain prevalent in many sectors. On the…
NetSupport and RaccoonStealer malware spreads masked as Cloudflare warnings
Unknown attackers hacked WordPress sites to send fake DDoS protection notifications supposedly coming from Cloudflare and through such fakes, the attackers users with NetSupport RAT and the RaccoonStealer infostealer (aka…