Antivirus Is Important! Advantages Of Using
If you are one of those people who are contemplating whether to buy a new antivirus solution, we can only envy your confidence. These days going into the cyber world…
Information Security Specialist Showed How to Steal a Tesla Car
Sultan Qasim Khan, a security consultant of the NCC Group, has disclosed a vulnerability that allows attackers to enter the salon and steal a Tesla car. The vulnerability consists of…
Germans Interested in the Situation in Ukraine Are Attacked by the PowerShell RAT Malware
An unknown hacker attacked German users who are interested in information about the Russian invasion of Ukraine, infecting them with PowerShell RAT malware (more precisely, a remote access trojan) and…
Microsoft Has Not Fully Coped with PetitPotam Attacks in Windows NTLM Relay
In May, Microsoft released a security update, as it had previously not fully coped with attacks called PetitPotam. The update and mitigation recommendations target a heavily exploited vulnerability in NTLM…
What is SSL Certificate?
Many of us have probably noticed various security-related markings around browsers' address bars, but our understanding of what it all meant remained vague. These things are a closed padlock icon,…
LockBit attacks the Canadian defensive co. Top Aces inc
Canadian defense contractor Top Aces Inc became the victim of a ransomware attack. LockBit group, an infamous ransomware gang known for its strict principles, already claimed responsibility. They boasted of…
Vulnerability in HP BIOS causes system takeover
Following recent fixes for a large number of UEFI vulnerabilities, worldwide-known PC and laptop vendor HP is releasing a new BIOS update. This time around, two serious vulnerabilities affecting a…
The 5 Most Famous Spyware Attacks
Spyware can be called the most sophisticated malware these days. It never acts openly, uses tricky techniques, and appears more often with other viruses. Together with its brother-in-law - stealer…
Vulnerabilities Allow Hijacking of Most Ransomware to Prevent File Encryption
Not a long time ago, a cybersecurity analyst posted a video on YouTube where he shows the vulnerability in ransomware samples used by well-known ransomware groups. In the footage, expertly…
Yahoo Search: How to Remove Yahoo from Chrome?
Yahoo Search is a legitimate search engine that exists for over 25 years. When chosen by desire, it offers all the basic functions of any search engine. However, there are…
Can Malware Spread Through a Shared Wi-Fi Connection?
It is hard to imagine the modern world without wireless connections. Wi-Fi routers and Bluetooth devices have become a part of our everyday life. And yet, not more than fifteen…
A DNS vulnerability in uClibc/uClibs-ng libraries jeopardizes IoT devices
A vulnerability has been discovered (CVE not yet issued) in uClibc and uClibc-ng C standard libraries. These libraries are vastly used in IoT devices. The newly found vulnerability makes it…