Chinese Hackers Injected a Backdoor into the MiMi Messenger
SEKOIA and Trend Micro specialists published reports on the activity of the Chinese hack group APT27 (aka Emissary Panda, Iron Tiger, and LuckyMouse) and said that hackers introduced a backdoor…
Cuba Ransomware Operators Use Previously Unknown ROMCOM RAT
Palo Alto Networks reports that the Cuba ransomware operators have begun to use new tactics in their attacks, including the use of a previously unknown remote access trojan (RAT) called…
Auto Parts Manufacturer Attacked by Three Different Ransomware in Two weeks
Sophos experts told about an interesting case when an unnamed auto parts manufacturer was attacked by three different ransomware in a row, in just two weeks. Let me remind you…
6 Steps and Tips Avoid Online Shopping Scams
Online sales have been consistently rising each year, with global e-commerce sales reaching unprecedented levels in 2025. This upward trend is fueled by increased internet accessibility, the proliferation of smartphones,…
Microsoft fixes DogWalk bug as part of Patch Tuesday
Microsoft fixed more than 120 vulnerabilities this month, including the DogWalk bug, as part of the traditional "Update Tuesday". Indeed, one of the most serious issues in the package was…
IS Specialists Discovered a New Version of Malware from Russian Hackers LOLI Stealer
Cyble Research Labs specialists found a sample of malware in the wild, which turned out to be an updated version of a previously discovered malware named LOLI Stealer. Let me…
Slack Is Resetting User Passwords Due to a Bug
Slack developers have notified about 0.5% of users that they are forcibly resetting their passwords due to a bug. They will need to change their passwords due to a recently…
Twilio Falls Victim To Phishing Attack
Twilio, a tech giant from San Francisco, became a victim of a phishing scam, resulting in the exposure of consumers’ data. The exact incident took place on August 4 and…
6 Popular Types of Hackers: Protection Tips in 2022
The internet has given us many wonderful things: smart homes, NFTs, cryptocurrency, and more. Without our connection to the internet, the world would be a much different place today. Unfortunately,…
Most Often, Malware to Bypass Protection Impersonates Skype, Adobe Acrobat and VLC
VirusTotal analysts presented a report on the methods that malware operators use to bypass protection and increase the effectiveness of social engineering. The study showed that attackers are increasingly imitating…
ParseThru Vulnerability Threatens Go-Based Applications
Researchers have discovered a vulnerability called ParseThru — the bug affects Go-based products and can be abused to gain unauthorized access to cloud applications. Experts from the Israeli company Oxeye,…
BlackCat Says It Attacked Creos Luxembourg, European Gas Pipeline Operator
The operators of the BlackCat ransomware (aka ALPHV) claimed responsibility for hacking Creos Luxembourg, which operates a gas pipeline and electricity grid in central Europe. Encevo, which owns Creos Luxembourg…
