Cybersecurity researchers published an exploit for Windows that allows escalating privileges
Bleeping Computer reported that cybersecurity researcher has published an exploit for a new zero-day vulnerability that can be used to escalate local privileges in all supported versions of Windows, including…
Researchers have suggested using smartphones to find hidden cameras
A team of researchers from the National University of Singapore and Yonseo University have described an interesting concept: the use of time-of-flight (ToF) sensors in modern smartphones to find hidden…
Researchers noticed that the darknet is discussing exploits as a service
Analysts at Digital Shadows have prepared a report on the exploit market on the darknet - it is noticed that the criminals have come up with an "exploits as a…
New Rowhammer Attack Breaks DDR4 Memory Protection
Researchers have unveiled a new fuzzing attack technique, Blacksmith, which proves that a Rowhammer attack on DDR4 memory is possible and bypasses existing defense mechanisms. It is worth noting that…
Hackers broke into FBI mail server and sent fake cyberattack alerts
Last weekend, unknown hackers managed to break into the mail server of the Federal Bureau of Investigation (FBI). Hackers used the access to send letters that imitated FBI alerts about…
Clop ransomware exploits vulnerability in SolarWinds Serv-U
The NCC Group warns of a spike of Clop ransomware attacks (hack group also known as TA505 and FIN11), which exploits a vulnerability in SolarWinds Serv-U. Most of them start…
NUCLEUS: 13 Problems Threat to Medical Devices, Automobiles and Industrial Systems
Forescout and Medigate Labs issued a report on NUCLEUS:13 problems - A Set of 13 vulnerabilities which affect Siemens Software Library that is widely used in medical devices, automotive and…
US authorities arrest Kaseya hacker and attacker associated with REvil and GandCrab
Law enforcement agencies, as well as European and American authorities, have taken up the fight against ransomware in earnest and the other day they arrested a Kaseya hacker. However, over…
US authorities offer $10 million for information on DarkSide operators
The US government has offered a $10,000,000 reward for any information that could lead to the identification or arrest of members and operators of the DarkSide hack group. It is…
Trojan Source attack is dangerous for compilers of most programming languages
Scientists at the University of Cambridge, Ross Anderson and Nicholas Boucher, have published information about the Trojan Source attack concept (CVE-2021-42574), which can be used to inject malicious code into…
Operators of the BlackMatter ransomware announced the termination of activity
The hackers behind the BlackMatter ransomware the termination of activity experiencing pressure from local authorities. The group announced it was “shutting down” on November 1, 2021, in the backend part…
Expert hacked 70% of Wi-Fi networks in Tel Aviv for research
CyberArk specialist Ido Hoorvitch hacked 70% of Wi-Fi networks in his native Tel Aviv, seeking to prove that home networks are poorly secured and easily compromised. To conduct the experiment,…