News, Tips, Security Lab

GoTrim botnet hacks WordPress

GoTrim Malware Hacks WordPress Sites

Fortinet specialists have discovered a new GoTrim malware written in Go that scans the Internet for WordPress sites and brute-forces…

Android Malware. Is Malware on Android Phone Possible?

Android malware is a common name for all malicious software present in Android. This OS appears not only on phones…

New Version of Truebot Exploits Vulnerabilities in Netwrix Auditor and Raspberry Robin Worm

Information security experts warned of an increase in the number of infections with the new version of TrueBot, primarily targeting…

How Not to Stumble on Scam Websites

Every year, one in ten Americans will be victimized by a scam or fraud. The variety of online fraud has…

Hackers Stole over $2.5 million from Hackers

In the past 12 months hackers have scammed more than $2.5 million from other cybercriminals on three separate hack forums…

EBay organized persecution of bloggers

eBay employees organized persecution and intimidation of a family of bloggers

Six former eBay employees became involved in a strange trial. According to the investigation, eBay employees organized the persecution and intimidation of a couple of bloggers from the city of…

Chrome spyware installation campaign

Experts discovered Chrome largest spyware installation campaign

Specialists from the company Awake Security reported about currently perhaps the largest spyware campaign for installing spyware in Google Chrome. As part of the campaign, criminals registered thousands of domains…

Vulnerabilities in Old GTP

Vulnerabilities in old GTP protocol could affect 4G and 5G networks

Experts cautioned that vulnerabilities in the old GTP (GPRS Tunneling Protocol) could quite seriously affect the operation of 4G and 5G networks. In reports published last week and in December…

GitHub will replace the term "master"

GitHub will replace the term “master” with a more neutral one

Nat Friedman, leading GitHub after acquiring Microsoft in 2018, said on Twitter that GitHub will replace the term “master” with a more neutral synonymous. For example, main, to avoid unnecessary…

CloudEyE collaborated with ransomware operators

Italian IT company CloudEyE collaborated with ransomware operators

For about four years, the Italian company CloudEyE was engaged in a seemingly legal business, offering protection of binaries from reverse engineering for Windows applications, however, at the same time,…

COVID-19 Contact Tracking Apps

Fake COVID-19 contact tracking apps install banking trojans

Researchers from California-based IS company Anomali have discovered 12 fake COVID-19 patient contact tracking apps posing as official programs. Attackers are actively exploiting the panic around the coronavirus pandemic to…

SGAxe endangers Intel processors

SGAxe attack endangers Intel processors

As part of the June “Update Tuesday,” Intel fixed more than 20 different vulnerabilities in its products, including the SGAxe bug, which endangers several Intel processors. The manufacturer also released…

Microsoft fixed 129 vulnerabilities

On June “Patch Tuesday” Microsoft fixed 129 vulnerabilities in its products

“Patch Tuesday” this month became the largest in the history of Microsoft: were fixed at once 129 vulnerabilities. March 2020 with 115 corrections is in second place, and 113 corrections…

Google maps helps protect from COVID-19

Google Maps helps users protect themselves from COVID-19

Google has added a number of new features to its mapping service to help users protect themselves from COVID-19. Google Maps now provides travelers and people on duty with public…

Ransomware Tycoon uses JIMAGE

Tycoon ransomware uses exotic JIMAGE format to avoid detection

BlackBerry experts have discovered an unusual multi-platform (for Windows and Linux) ransomware Tycoon. It is written in Java and uses JIMAGE image files to avoid detection. Researchers believe Tycoon was…

YouTube Channel Credentials

Hacker forums show growing demand for credentials from YouTube channels

IntSights experts found that recently in the darknet there increased interest YouTube Channel Credentials, and also, as a “side effect”, this stimulates data verification activities. On hacker forums and sites…

Cybercriminals attacked UCSF

Cybercriminals attacked UCSF, US leading COVID-19 vaccine developer

Using ransomware, cybercriminals attacked the University of California, San Francisco (UCSF), one of the leaders in developing a vaccine against COVID-19. The university administration confirmed to Bloomberg reporters that it…