News, Tips, Security Lab

Ransom Cartel and REvil

Researchers Linked Ransom Cartel members to Famous Hack Group REvil

Experts from the Palo Alto Network analysed the Ransom Cartel hacker group’s ransomware and believe that it is very similar…

Safari Can’t Establish a Secure Connection Error

The “Safari Can’t Establish a Secure Connection” error message appears when browsing the web on a Mac. It may be…

New PowerShell Backdoor Masquerades as a Windows Update

Cybersecurity experts from SafeBreach have found a new, previously undocumented and “undetectable” PowerShell backdoor, which hackers actively use and has…

How to Stop McAfee Popups on Chrome: Tips, Recommendation

It’s a good tone to be concerned about safety on the Internet. It’s ok when you have antivirus software installed,…

Weak Block Cipher in Microsoft Office 365 Leads to Message Content Disclosure

WithSecure (formerly F-Secure Business) researchers claim that the content of encrypted messages sent through Microsoft Office 365 can be partially…

TOP 10 software vulnerabilities

US authorities have published the top 10 software vulnerabilities, most often exploited over the past 5 years

Cybersecurity and Infrastructure Protection Agency (CISA), part of the US Department of Homeland Security, and the Federal Bureau of Investigation (FBI) published the TOP 10 software vulnerabilities, most commonly exploited…

LiveJournal users data

To the network leaked data of 33.7 million LiveJournal users

In the Telegram channel of the head of DeviceLock company Ashot Hovhannisyan, arrived information about data leak of 33.7 million users of LiveJournal (also known as LJ). The researchers reported…

Hackers attacked Stadler

Hackers attacked Swiss company Stadler that produces trains

Hackers attacked the company Stadler. A well-known Swiss train manufacturer reported about a cyberattack, during which attackers could steal data of the company and its employees. Stadler manufactures a wide…

Botnet Cereals downloaded anime

For eight years, the Cereals botnet existed for only one purpose: it downloaded anime

The Cereals IoT botnet appeared in 2012, and reached its peak in 2015, when there were about 10,000 infected devices. All these eight years, the Cereals botnet only downloaded anime…

Fresenius attacked with Snake ransomware

Europe’s largest private hospital operator Fresenius attacked with Snake ransomware

Fresenius, Europe’s largest private hospital operator and major provider of products and services for dialysis, was affected during Snake ransomware cyberattack. According to KrebsOnSecurity sources, the incident disrupted some systems,…

Jio disclosed COVID-19 data

Techno giant Jio disclosed data of people tested for COVID-19

Recently, India’s technology giant Jio, partly acquired by Facebook, has disclosed the confidential data of people, tested for COVID-19. In March of this year, Jio released a service that allows…

Hackers Attacked Ghost Platform

Hackers Attacked Ghost Blogging Platform and LineageOS Servers Using Salt Vulnerabilities

According to the development team of the Ghost blogging platform, hackers attacked it using the Authentication bypass vulnerabilities (CVE-2020-11651) and directory bypass (CVE-2020-11652) vulnerabilities in Salt in order to gain…

Trump declared a state of emergency

Trump declared a state of emergency due to cyberattacks on US energy systems

Last Friday, President Trump declared a state of emergency in the country due to cyberattacks on the US energy system. Now he is taking steps to protect the energy system…

researcher discovered a vulnerability in GitLab

IS researcher discovered a critical vulnerability in GitLab

IS researcher William Bowling made $20,000 by discovering a critical vulnerability in GitLab. The bug allowed achieving the execution of arbitrary code or stealing confidential data from the server. Bowling…

Google talked about vulnerabilities in Apple

Google experts talked about vulnerabilities in Apple operating systems

Google Project Zero specialists discovered and described many vulnerabilities in Apple’s operating systems. For example, they are part of the Image I/O framework, which is used for parsing images and…

Grandoreiro spreads through fake videos

Grandoreiro Banker Spreads Through Fake Coronavirus Videos

ESET analysts warned about surge in the activity of the banking Trojan Grandoreiro amid COVID-19 pandemic. The bunker is distributed through fake coronavirus videos. Experts report that Grandoreiro, previously written…

Twitter disabled SMS

End of an era: Twitter disabled SMS in most countries

Twitter said it disabled option of using SMS with the text of new tweets last week due to security issues. The function was disabled in all countries, except for “several”…