News, Tips, Security Lab

SLP Vulnerability Creates New DDoS Opportunities

New SLP Vulnerability Allows 2200x DDoS Amplification

A recently-discovered vulnerability in SLP, a legacy network protocol, can be used for disastrous increasing in DDoS-attack efficiency. As researchers…

Supply Chain Attack Leads to 3CX Hack and Other Supply Chain Attacks

An investigation into a supply chain attack that hit 3CX last month found that the incident was caused by another…

Capita Hacked, Black Basta Gang Publishes Data

Capita, a London-based international business process outsourcing company, was hacked recently. Users noticed strange events in the company earlier this…

Medusa Groups Claims That It “Merged” the Source Code of Bing and Cortana into the Network

Medusa extortionist group claims to have published internal materials stolen from Microsoft, including the source codes of Bing, Bing Maps…

Chinese Hackers Use Google Command & Control Capabilities in Attacks

Google experts have warned that the Chinese “government” hack group APT41 is abusing the red team’s GC2 (Google Command and…

0-day bug in Windows 7

Researcher accidentally found 0-day bug in Windows 7 and Windows Server 2008

French cybersecurity researcher Clément Labro was working on a security…

NATO experimented with deceptive techniques

NATO experimented with deceptive techniques to combat Russian hackers

During a cyber exercise in Estonia on November 16-20, NATO…

How to steal a Tesla Model X

The researcher showed how to steal a Tesla Model X in a few minutes

Information security specialist Lennert Wouters from the Catholic University of…

LidarPhone attack on vacuum cleaner

LidarPhone attack will make your vacuum cleaner spy on you

A group of scientists from the University of Maryland and…

Google services in phishing campaigns

Cybercriminals started using Google services more often in phishing campaigns

Security researchers have reported an increase in cyberattacks using Google…

Change your passwords

Though 2020 is ending, the list of worst passwords is still topes “123456”

The end of the year is approaching, and the developers…

FTP disabled in Chrome 87

Chrome 87 Fixed NAT Slipstream Vulnerability and Disabled FTP Support

Google engineers introduced Chrome 87, in which was disabled FTP…

VoltPillager attack on Intel SGX

VoltPillager attack compromises Intel SGX

A group of researchers from the University of Birmingham have…

Microsoft accused Russia

Microsoft accused Russia and North Korea of attacks on pharmaceutical companies

Microsoft representatives accused Russia and North Korea of attacks on…

CostaRicto mercenary hackers

CostaRicto mercenary hackers target financial institutions around the world

BlackBerry experts told about the discovery of a group of…

multi-factor authentication via phone

Microsoft urges users to opt out of multi-factor authentication via phone

Microsoft experts have once again raised the issue of the…

Platypus attack Intel processors

Platypus attack allows stealing data from Intel processors

A group of scientists from the Technical University of Graz…