News, Tips, Security Lab

What’s Become of Conti Ransomware?

Conti Ransomware Heritage in 2023 – What is Left?

Ransomware groups come and go, but the people behind them continue to use their hacking and extortion skills in new…

The AI-Controlled Drone Did Not “Kill” Its Operator Even During the Simulation. At Least for Now

At the recent Future Combat Air and Space Capabilities summit, the head of AI testing and operations at the US…

Russian Hacker Sells Terminator Tool That Is Allegedly Able to Bypass Any Antivirus Programs

A tool called Terminator appeared on one of the Russian hacker forums, and, according to its author, can destroy any…

What is Business Email Compromise (BEC) Attack?

Business email compromise attack, or shortly BEC, is a relatively new vector of cyberattacks. Dealing primary damage by exposing potentially…

MOVEit MFT 0-day Vulnerability is Used to Steal Corporate Data

MOVEit managed file transfer (MFT) solution appears to contain a 0-day vulnerability, already exploited by hackers. Progress, the developer of…

Ukrainian cyber police uPanel

Ukrainian cyber police arrested the author of uPanel phishing kit

Ukrainian cyber police have arrested a 39-year-old man who is…

hacker changed the composition of water

Hacker changed the chemical composition of drinking water in a small Florida town

Law enforcement and local authorities in Oldsmar, Florida, reported that…

Chrome Sync function

Researcher discovered that Chrome Sync function can be used to steal data

Croatian researcher Bojan Zdrnja discovered a malicious Chrome extension abusing…

Google paid cybersecurity experts

In 2020, Google paid cybersecurity experts $6.7 million

During the year, Google paid out 6.7 million to cybersecurity…

Google on 0-day vulnerabilities

Google says that a quarter of all 0-day vulnerabilities are new variations of old problems

Google analysts studied the 0-day vulnerabilities they discovered in 2020,…

WEF warned of cyber pandemic

WEF warned of impending cyber pandemic

The WEF experts warned about the impending cyber pandemic and…

Android emulator NoxPlayer with malware

Hackers infected the Android emulator NoxPlayer with malware

UPDATE: BigNox contacted us and said that they “contacted cybersecurity…

FonixCrypter ransomware stopped working

FonixCrypter ransomware stopped working and published a key to decrypt data

The authors of the FonixCrypter ransomware announced that they had…

LogoKit phishing kit

LogoKit phishing kit allows creating phishing pages in real time

RiskIQ researchers said that the new LogoKit phishing kit was…

DreamBus attacks corporate applications

DreamBus botnet attacks corporate applications on Linux servers

Zscaler analysts reported about the new DreamBus botnet that attacks…

South Africa continue to use Flash

Authorities of South Africa create their own browser to continue to use Flash

ZDNet reports that the South Africa Revenue service has created…

worst computer virus

What is the worst computer virus? Figuring out

Worst computer virus – what is it? Seems that anyone…