T-Mobile Admits that Lapsus$ Hack Group Stole Its Source Codes
Information security specialist Brian Krebs found out that even before the arrests, the Lapsus$ hack group managed to compromise the telecom giant T-Mobile. The company confirmed this information, saying that…
TOP 12 Most Dangerous Types of Phishing Attacks 2022
Phishing is a type of cyberattack that is committed with the use of different techniques. They include malware, social engineering, and spamming. The main target and phishing is generally personal…
Amazon Patch for Log4Shell allowed privilege escalation
Palo Alto Networks warns that a patch released by Amazon to protect AWS from high-profile issues in Apache Log4j, including the Log4Shell vulnerability, poses a threat to users. The patch…
Hackers Use Fresh Vulnerability in Windows Print Spooler in Real Attacks
The US Infrastructure and Cybersecurity Agency (CISA) warned that a vulnerability in the Windows Print Spooler component, patched by Microsoft in February 2022, is being actively exploited by hackers. The…
TOP 9 Malware Attacks: Compilation 2022
The World Wide Web is not a hostile realm by itself, but any Internet user should be aware of the dangers lurking on the Net. If earlier harmful software was…
The Best Ransomware Protection for 2024
Ransomware is considered one of the most dangerous types of malware. You may disagree, but the occasion when your data becomes inaccessible bleaches all other threats. While spyware attacks, backdoors,…
Shuckworm hackers attack Ukrainian organizations with new variant of Pteredo backdoor
Specialists from the cybersecurity company Symantec reported attacks by the cybercriminal group Shuckworm (Armageddon or Gamaredon) on Ukrainian organizations using a new version of the Pteredo (Pteranodon) custom backdoor. The…
PRODAFT Published PYSA Ransomware Report
Recently specialists from PRODAFT (Proactive Defense Against Future Threats) published an extensive report about the infamous ransomware variant PYSA. The detailed information in the report " PYSA (Mespinoza) In-depth analysis"…
Nation-State Threat Actors are an Actual Menace, According to CISA
On April 13, the US government (specifically, the Department of Energy, the Cybersecurity and Infrastructure Security Agency, the National Security Agency, and the Federal Bureau of Investigation) made a warning…
Experts Analyzed the Activities of the PYSA Cyber-Extortion Group
Specialists from the Swiss cybersecurity company PRODAFT have published the results of an 18-month study on the PYSA cyber-extortion group. PYSA (an acronym for "Protect Your System, Amigo") is the…
RuRansom Malware Destroys Data in Russian Systems
VMware specialists spoke about the activity of the RuRansom wiper, which attacks Russian systems and deliberately destroys its data, including backups. Unlike ordinary cryptographers who extort ransoms from the victims,…
Anonymous hackers published the mail database of the Ministry of Culture of Russia
The media discovered that Anonymous hackers had made public a database of emails from the Russian Ministry of Culture, the administration of the city of Blagoveshchensk, and the office of…