Most likely russian hackers defaced Ukrainian government websites
Hackers defaced several Ukrainian government websites: the attack occurred on the night of January 13-14 and affected the websites of the Ukrainian Foreign Ministry, the Ministry of Education and Science,…
Teen gets remote access to 25 Tesla cars
19-year-old David Colombo said on Twitter that he gets remote access to 25 Tesla cars in 13 countries around the world. According to him, the problem was not with the…
Critical vulnerability in Office fixed, but macOS update is delayed
As part of the January Patch Tuesday, Microsoft engineers fixed a critical vulnerability in Office that could allow attackers to remotely run malicious code on vulnerable systems. The RCE vulnerability…
Vulnerability in macOS Leads to Data Leakage
Microsoft said that attackers could use a macOS vulnerability to bypass Transparency, Consent, and Control (TCC) technology and gain access to protected user data. Back in the summer of 2021,…
Spy method NoReboot allows simulating iPhone shutdown and prying through the camera
The NoReboot spy method allows intercepting the iPhone restart and shutdown process and prevent them from ever happening. ZecOps has developed a new method to simulate restarting or shutting down…
Chinese hack group Aquatic Panda exploits Log4Shell to hack educational institutions
Specialists of information security company CrowdStrike warn: the Chinese cyber-espionage hack group Aquatic Panda uses the Log4Shell vulnerabilities, with the help of which a large educational institution was compromised. Let…
Volvo Cars under Snatch attack
In its press release, Volvo Cars, a Swedish multinational luxury vehicle manufacturer based in Torslanda, Gothenburg, reported unlawful third party access to its records. Upon discovery of the violation, the…
Antivirus scanner and anti-malware. What is the difference?
Antivirus, anti-malware software, antivirus scanner… There are so many terms, and all of them look so similar, but they’re different. It is easy to confuse the user who does not…
Magnat campaigns delivering fake installers
Cyber security specialists warn of the Magnat malicious distribution waves targeted at the potential users of some most popular software. Threat actors use the methods of malvertising to successfully distribute…
Slow PC: Tips to improve PC performance in Windows
Have you been noticing strange decelerations or even freezings in the work of your computer lately? Has it become noisier, as if it struggles, loaded with tasks when you know…
The 2easy trading platform is gaining popularity on the darknet
KELA analysts say that the 2easy trading platform is gaining popularity on the darknet, gradually becoming an important player in the sale of stolen data. The company's report states that…
Another vulnerability found in Log4j, this time it is a denial of service
Log4Shell, recently discovered in the popular logging library Log4j, which is part of the Apache Logging Project, continues to get worse, as another vulnerability has been found. This time it…