Penetration Testing: Stages and Methods
What is penetration testing? Penetration testing is a method by which the security of computer systems and networks can be assessed by simulating a hacker’s attack. It is possible to…
Around 2000 People Arrested by Interpol for Internet Scams
Operation "First Light" The war on cybercrime goes on. As its next round unwinds in 2022, Interpol arrests hundreds of Internet-fraud-related suspects within two months. The operation in question got…
VPN, Proxy, or Tor: Differences, Meaning
You've probably heard the words VPN, Proxy, and Tor. You may even regularly use these technologies to remain anonymous, bypass blockades, view content blocked in your region, or simply access…
BlackCat ransomware gang publishes leaked data on the clear web site
BlackCat/ALPHV group recently announced on its victim shaming and extortion website that it had hacked into a luxury spa and resort in the Western United States. At one moment in…
War in Ukraine triggered a Stream of amateurish ransomware
Russia has provoked hackers around the world to focus their attacks on the servers of the largest companies, TV channels, banks, and government agencies. According to the statistics given by…
The US Will Introduce A Cyber Army Into Its Military Units
By 2030 the US plans to double the size of its military cyber units. The Pentagon prepares for future battles that will involve military operations on the cyber field. The…
Iranian Spear-Phishing Operation Targets US And Israeli High Executives
In a wake of rising tensions between Israel and Iran, researchers from Check Point Research (CPR) discovered numerous attempts of spear phishing attacks from the supposedly Iranian Phosphorus APT group.…
TOP DNS Attacks Types
What is a DNS (Domain Name Server) Attack? A DNS attack is the situation when an attacker either attempts to compromise a DNS network or uses its inherent attributes to…
Google Is Trying to Get Rid of the Engineer Who Suggested that AI Gained Consciousness
Blake Lemoine, a senior software engineer at Google's Responsible AI division, told The Washington Post that he thinks Google's LaMDA (Language Model for Dialogue Applications) chatbot has become conscious. As…
BlackCat Ransomware Attacks Italian University
An Italian university was hit by BlackCat this week. The hackers demand a $4.5 million ransom. BlackCat is a new, but very potent ransomware gang that carries several distinctive features…
A Bug in the System Allows Adding a new NFC Key for a Tesla Car
Austrian researcher Martin Herfurt has demonstrated a new way to steal a Tesla - for this attacker can abuse the function of adding a new NFC key, doing it unnoticed…
Difference Between Phishing and Pharming
Intruders try to keep up with the development in the digital world. The technology seeks to provide users with more effective resources, but the attackers in turn try to come…