News, Tips, Security Lab

Black Friday Shopping Scams in 2023

Black Friday Scams: Ways to Detect & Avoid Shopping Frauds

As the main shopping event of the year approaches, Black Friday shopping scams have into view. Con actors from all…

Exploit for Vulnerabilities ProxyNotShell Appeared on the Network

Experts warned that an exploit for two high-profile vulnerabilities in Microsoft Exchange, which are collectively called ProxyNotShell, has appeared in…

Security Experts Secretly Helped Zeppelin Ransomware Victims for Two Years

Since 2020, some information security specialists have helped victims, as individuals and companies affected by the Zeppelin ransomware. The fact…

Unit221b Secretly Helped Victims of Zeppelin Ransomware for 2 Years

Security professionals at Unit221b found vulnerabilities in the Zeppelin ransomware encryption mechanism. Experts managed to use them to create a…

What Is an Evil Twin Attack? How Does It Work?

How often do we connect to free Wi-Fi networks in public places? Whether to post Instagram stories with a cup…

BadPower can set devices on fire

BadPower attack can set devices on fire

Chinese experts from Xuanwu Lab (research arm of Tencent) have published a report on the BadPower attack technique, which can set on fire various devices with the use of Quick…

BlackRock Trojan on Android OS

BlackRock Trojan steals passwords and card data from 337 applications on Android OS

Researchers from ThreatFabric have published a report on the study of a new Trojan on Android OS, called BlackRock. This malware is aimed stealing data from various applications, including dating…

PoC exploit for RECON vulnerability

For RECON vulnerability appeared PoC exploit

Earlier this week, it became known that SAP engineers fixed the dangerous error CVE-2020-6287, which affects most of the company’s customers and applications. The vulnerability is called RECON and for…

Microsoft fixed 123 vulnerabilities

On July “Patch Tuesday”, only Microsoft fixed 123 vulnerabilities

As part of the July update Tuesday, Microsoft engineers fixed 123 vulnerabilities in 13 different products. Any of them was under attack. In July did not reach the record of…

Linus Torvalds approved the exclusion

Linus Torvalds approved exclusion of the terms slave, blacklist and others from the Linux kernel code

More recently, we talked that the IT community has also returned to discussing inappropriate and offensive terminology under the influence of Black Lives Matter protests that swept across the United…

NightLion hacked DataViper

NightLion hacker claims to have hacked DataViper information security company

A hacker, hiding under the pseudonym NightLion, claims that has exploded the service for monitoring and aggregating leaks DataViper and has already put on sale over 8 thousand company databases…

Analysts say that over 5 billion unique credentials can be found on the black market

Analysts say that over 5 billion unique credentials can be found on the black market

Analysts at Digital Shadows have estimated that there are currently more than 15 billion stolen logins and passwords, including more than 5 billion unique credentials, on the black market (hacker…

Google Unveiled Tsunami Code

Google Unveiled a Source Code for Tsunami Vulnerability Scanner

Google has unveiled the source code for the Tsunami scanner, a scalable solution for detecting dangerous vulnerabilities with a minimum of false positives. The scanner is aimed at large corporate…

Mozilla Suspended Firefox Send

Mozilla suspended Firefox Send service due to abuse and malware

Journalists from ZDNet drew attention of Mozilla engineers to numerous abuses of the Firefox Send service, which was actively used to distribute the malware. Mozilla temporarily suspended the Firefox Send…

Algorithm for protection against deepfakes

Scientists have introduced a new algorithm for protection against deepfakes

Scientists from Boston University have introduced a new algorithm for protection against deepfakes. Their filter modifies pixels so that videos and images become unsuitable for making fakes. With the development…

black hat - not neutral enough

Google vice president says “black hat” is not a neutral term

Journalists from ZDNet noticed that during the weekend there was a hot discussion in the information security community due to the “lack of neutrality” of the term black hat. The…

Attackers hack Roblox accounts

Attackers hack Roblox accounts and urge to vote for Trump

According to the ZDNet publication, unknown attackers hack Roblox accounts and leave a message “Ask your parents to vote for Trump this year! #MAGA2020 ” in about 1800 users’ profiles…