News, Tips, Security Lab

Instagram Bitcoin Scams: Beware of “Get Rich With Bitcoin” Instagram Scams

“Get Rich With Bitcoin” Instagram Bitcoin Scams

Instagram is a vast social network with over a billion active users. Fraudsters do not miss the chance to develop…

Fake Sites for Adults Destroy User Data

Experts from the Cyble company have discovered a number of fake adult sites that distribute ransomware. However, a detailed analysis…

Meta Finds over 400 Chinese Apps That Stole Data from 1 million Users

Meta has sued several Chinese companies (including HeyMods, Highlight Mobi and HeyWhatsApp) for developing and using “unofficial” WhatsApp apps for…

How to Access the Dark Web Safely: Useful Tips for the Darknet

Is the dark web legal? Despite Darknet’s association with illegal activity, accessing and browsing the dark web is legal. However,…

Hacker Group XDSpy Distributes Malware in Russia under the Guise of Subpoenas for the Army

In early October, Kaspersky Lab experts recorded a targeted attack on Russian organizations: attackers from the XDSpy hacker group sent…

Discord as a tool for stealing password

Hackers use Discord as a tool for stealing passwords

The Bleeping Computer magazine warns that the new version of the AnarchyGrabber Trojan steals passwords and tokens, disables 2FAs and distributes the malware to the victim’s friends. Moreover, attackers modify…

Sarwent Opens RDP Ports

Sarwent malware opens RDP ports on infected machines

SentinelOne experts noticed that the new version of the Sarwent malware opens the RDP ports on infected computers. Researchers believe that this is due to the fact that maware operators…

Qatar spyware containing COVID-19

Qatar obliged citizens to install “spyware” for containing COVID-19 pandemic

As part of the fight against the spread of coronavirus infection, the Qatar government has obliged citizens and residents to install special software on their mobile devices to contain the…

GitLab checked employees on phishing

GitLab checked its employees: on phishing got every fifth

Recently, the GitLab platform conducted a security audit, analyzing if working from home employees are resistant to phishing attacks. As it turned out, every fifth got on phishing in GitLab:…

GhostDNS source code exploit

Avast experts accidentally got source code for GhostDNS exploit

Avast analysts suddenly got the source codes for the GhostDNS exploit. The experts got access to the source thanks to an error from an unknown hacker. GhostDNS is a set…

five 0-day vulnerabilities in Windows

ZDI experts described five 0-day vulnerabilities in Windows

Researchers from the Trend Micro Zero Day Initiative (ZDI) team published information on five uncorrected 0-day vulnerabilities in Windows, four of which have high risk rate. Three zero-day vulnerabilities, which…

Twitter bot detection tool

Experts developed a free bot detection tool on Twitter

NortonLifeLock, which appeared after Symantec sold its information security division and brand Symantec Broadcom for $10.7 billion, developed a bot detection tool on Twitter. Experts have unveiled a beta version…

Hackers Cracked European Supercomputers

Hackers cracked European supercomputers and forced them to mine cryptocurrency

In Europe were attacked super powerful computers at universities and research centers: hackers cracked European supercomputers and forced them secretly mine cryptocurrency. Reports of such incidents came from the UK,…

Mandrake was hiding on Google Play

Mandrake malware was hiding on Google Play for more than four years

Bitdefender experts found Mandrake spyware in the official Android app store, hiding on Google Play for four years (since 2016). The malware established full control over infected devices, collected credentials,…

Ramsay attacks isolated PCs

Ramsay malware attacks PCs, which isolated from the outside world

ESET analysts discovered the infrastructure of a previously unknown Ramsay malware with some very interesting features. Ramsay attacks and collects data from PCs, which are isolated from the outside world.…

TOP 10 software vulnerabilities

US authorities have published the top 10 software vulnerabilities, most often exploited over the past 5 years

Cybersecurity and Infrastructure Protection Agency (CISA), part of the US Department of Homeland Security, and the Federal Bureau of Investigation (FBI) published the TOP 10 software vulnerabilities, most commonly exploited…

LiveJournal users data

To the network leaked data of 33.7 million LiveJournal users

In the Telegram channel of the head of DeviceLock company Ashot Hovhannisyan, arrived information about data leak of 33.7 million users of LiveJournal (also known as LJ). The researchers reported…