News, Tips, Security Lab

Social engineering attacks and Cybersecurity

Most Common Types of Social Engineering Attacks

Intruders are developing more and more methods to get what they want. Social engineering is one of the most common…

Judge Sentences Former eBay Executives to Jail Terms for Harassing Bloggers

Last week, two former eBay executives were sentenced to prison terms for harassing a blogger couple who posted unflattering articles…

Common Cryptocurrency Scams and Frauds: How to Avoid

Fraudsters do not stand still and are always looking for new ways to steal money. Unfortunately, the massive growth of…

Fargo Ransomware aims at vulnerable Microsoft SQL servers

Ransomware rarely chooses the sole type of targets for their attacks. They roam from attacks on small coffee shops to…

Hack Group Witchetty Hides Malware in the Windows Logo

Symantec researchers have discovered a malicious campaign by the hacker group Witchetty, which uses steganography to hide malware in an…

Discovered new exploit for iOS

For iOS was discovered a new exploit, with the help of which China traced the Uyghurs

Specialists of the information security company Volexity discovered a new exploit for iOS called Insomnia. According to the researchers, the malware associated with the efforts of the Chinese authorities to…

Conspiracy theorists accused Gates

Conspiracy theorists accused Bill Gates in creating coronavirus

Microsoft founder Bill Gates fell victim of fake theories that he was allegedly involved in the creation of the coronavirus COVID-19. In fact, conspiracy theorists accused Bill Gates in creation…

GitHub warned about phishing attack

GitHub warned users about phishing attack

Representatives of the GitHub web service warned users of a massive phishing attack called Sawfish. Recently, users more and more often receive phishing emails with fake warnings about suspicious activity…

Malicious libraries in RubyGems repository

More than 700 malicious libraries detected in RubyGems repository

Information security researchers at ReversingLabs reported the discovery of 725 malicious libraries that stole the contents of the clipboard in the official RubyGems repository. RubyGems is a package manager for…

Hoaxcalls botnet attacks Grandstream

Hoaxcalls botnet attacks Grandstream devices

Palo Alto Networks experts warn that the Hoaxcalls botnet attacks the recently fixed vulnerability in the Grandstream UCM6200 series devices. The Hoaxcalls botnet is built on the source code of…

Chrome re-enabled FTP support

Due to the pandemic Google developers re-enabled FTP support for Chrome

Most recently, I wrote that Firefox developers plan to remove from their browser support for the FTP protocol, as consider it to be unsafe. At the same time, Google re-enabled…

around the world there are changes in the Internet traffic trends. In particular, because of the COVID-19 pandemic, raised interest in pirated sites

COVID-19 pandemic raised interest in pirated sites

Currently, hundreds of millions of people remain at home and occur global changes in the Internet traffic trends. In particular, because of the COVID-19 pandemic, raised interest in pirated sites.…

Microsoft bought the domain Corp.com

Microsoft bought the domain Corp.com, so criminals would not do it

The well-known IS journalist Brian Krebs drew attention to an interesting fact: this week Microsoft bought the domain Corp.com, so that criminals would not do it. The sum of transaction…

NASA staff hacker attacks

NASA staff faces exponential increase in number of hacker attacks

Representatives of the space agency said that recently NASA staff and home-based agency contractors suffered from increase in the number of hacker attacks, and their devices are constantly trying to…

Microsoft Exchange Servers Vulnerable

82.5% of Microsoft Exchange servers are still vulnerable

Information security experts from Rapid7 reported that more than 35,000 Internet-connected Microsoft Exchange servers are still vulnerable to the critical vulnerability CVE-2020-0688 that was fixed in February. The vulnerability affects…

Access to cameras on Mac and iPhone

Vulnerabilities allowed access to cameras on Mac, iPhone and iPad

Apple paid $75,000 to the IS researcher Ryan Pickren in the frameworks of the bug bounty program for vulnerabilities in Safari, due to which it was possible to access someone…

Increased number of

The number of “coronavirus” cyberattacks increased to 5,000 per day

Check Point experts estimated that the number of “coronavirus” cyberattacks increased to 5,000 per day, and number of attacks on sites posing as Netflix services doubled. Researchers say the total…