SYMBIOTE Backdoor and Rootkit Dropper Revealed
Symbiote Backdoor: a Stealthy and Highly Evasive Linux Malware Researchers at Blackberry and Intezer have revealed a malignant program dubbed Symbiote used to inject rootkits and backdoors into compromised Linux…
Internet Explorer shutdown. The Epithaf
On June 15, Microsoft will finally end support for Internet Explorer on various versions of Windows, almost 27 years after its launch on August 24, 1995. The desktop version of…
Team Xecuter’s life. How hackers leave after the arrest?
Gary Bowser, the Nintendo hacker, appears to be a very happy cybercriminal. Despite a prison term and another arrest, the 50-year-old Frenchman is enjoying life. So does his "collegue" -…
Companies Manage to Bargain With Ransomware Racketeers
Revelations of the Ransom-Negotiator In May, the racketeer-bargaining specialist (the negotiator) at a European production company had received an unexpected chat message from a malefactor who had hacked the specialist's…
The US Department of Justice Reports a Russian Botnet Dismantled
RSOCKS Russian Botnet Is No More as a Result of a Joint Operation According to the June 16 report by the US Department of Justice, the activity of a Russian…
10 Types of Cyber Security Attacks in IoT
In a world where information progress is rapidly developing, it is impossible to do without IoT. You probably don’t know what you’re talking about, so let’s take a quick look…
Microsoft Fixed Follina Vulnerability and 55 Other Bugs
As part of the June Patch Tuesday, Microsoft finally fixed the Follina Critical Vulnerability associated with Windows MSDT, and fixed 55 more bugs in its products. As a reminder, Follina…
Penetration Testing: Stages and Methods
What is penetration testing? Penetration testing is a method by which the security of computer systems and networks can be assessed by simulating a hacker’s attack. It is possible to…
Around 2000 People Arrested by Interpol for Internet Scams
Operation "First Light" The war on cybercrime goes on. As its next round unwinds in 2022, Interpol arrests hundreds of Internet-fraud-related suspects within two months. The operation in question got…
VPN, Proxy, or Tor: Differences, Meaning
You've probably heard the words VPN, Proxy, and Tor. You may even regularly use these technologies to remain anonymous, bypass blockades, view content blocked in your region, or simply access…
BlackCat ransomware gang publishes leaked data on the clear web site
BlackCat/ALPHV group recently announced on its victim shaming and extortion website that it had hacked into a luxury spa and resort in the Western United States. At one moment in…
War in Ukraine triggered a Stream of amateurish ransomware
Russia has provoked hackers around the world to focus their attacks on the servers of the largest companies, TV channels, banks, and government agencies. According to the statistics given by…