News, Tips, Security Lab

Difference HTTPS vs. HTTP? Why is HTTP not secure?

Difference HTTPS vs. HTTP? Why is HTTP not secure?

Any web page is stored on a server, a computer that is permanently connected to the Internet. When you follow…

Scammers Use Fake Dating Sites to Steal Money

Experts from ReasonLabs have discovered an unusual malicious scheme that has been operating since 2019 – carders used fake dating…

Trackid=sp-006 — What is this thing?

Cookie tracking is a kind of network activity on the server side that is considered potentially dangerous. Trackid=sp-006 is an…

Hackers Use CircleCI Fake Notifications to Access GitHub Accounts

GitHub warns that a large-scale phishing campaign aimed at users began on September 16: scammers send emails with fake notifications…

Signs of Identity Theft: How to Prevent It?

Identity theft is a rather unpleasant crime. Cybercriminals can not only empty your wallet but also stalk your digital space…

Citrix Releases New Patches

Citrix releases new patches, racing with the hackers that install encryptors on vulnerable machines

Destructive race: Citrix releases new patches, and hackers are actively attacking vulnerable servers and installing encryption engines on them. It seems that users are losing. At the beginning of this…

Windows 7 - End of Life

Windows 7 users will not receive a patch for critical vulnerability in the IE

Microsoft said Windows 7 users would not receive a patch for a critical vulnerability in IE. The fix will be available only to Windows 7 users who paid for extended…

Windows EFS Help Encryptors

Windows EFS can help encryptors and make work of antiviruses more difficult

Safebreach Labs reported that attackers could use the Windows Encrypting File System (EFS) for their needs. Windows EFS can help encryptors and make work of antiviruses more difficult. EFS has…

Patch for 0-day in Internet Explorer

Temporary patch for 0-day vulnerability in Internet Explorer arrived on the Internet

Earlier this week, Microsoft announced about vulnerability in Internet Explorer, which is already exploited for “limited targeted attacks”. Now arrived temporary patch for this 0-day vulnerability in Internet Explorer. The…

Government hackers attacked often

Government hackers attacked companies more often in 2019

Organizations are more likely to become victims of state-sponsored cybercriminals. Government hackers in 2019 began to attack companies around the world more often. 25% of companies associate attacks on their…

Hacker patches Citrix servers

Unknown hacker patches vulnerable Citrix servers

Recently, in the public domain appeared exploits for the critical vulnerability CVE-2019-19781, earlier found in the Citrix Application Delivery Controller (NetScaler ADC) and Citrix Gateway (NetScaler Gateway). Now it was…

Greta Thunberg in phishing campaigns

Greta Thunberg became the most popular character in phishing campaigns

Check Point analysts prepared a traditional monthly report on the most active threats, the Global Threat Index. Greta Thunberg and Christmas became the most popular topics in spamming and phishing…

Windows most dangerous vulnerability

IS specialist introduced a PoC exploit for one of the most dangerous vulnerabilities in Windows

The day after the release of the fix for one of the most dangerous vulnerabilities in the history of Windows, security researcher Saleem Rashid demonstrated how it can be used…

Farewell Windows 7 updates

Microsoft released farewell updates for Windows 7 and Windows Server 2008

On January 14, 2020, Microsoft stopped supporting Windows 7 for PCs of private users, and at the same time finally finished support of the mobile Windows 10 Mobile (1709), but…

Fancy Bear attacked Burisma

Fancy Bear Attacked Ukrainian Oil And Gas Burisma Company

Fancy Bear, also known as APT28, orchestrated an attack on Burisma. Hackers linked to Russian intelligence executed a phishing campaign targeting employees of the Ukrainian oil and gas company Burisma…

Cable Haunt Threats Broadcom

Cable Haunt Vulnerability Threats Millions of Modems with Broadcom Chips

Danish researchers have published a report on the Cable Haunt vulnerability that threats millions of cable modem with Broadcom chips. According to experts, the problem threatens more than 200 million…

Researcher remotely hacked iPhone

Researcher remotely hacked iPhone using only one vulnerability

Researcher in a few minutes remotely hacked iPhone using only Apple ID and exploiting only the CVE-2019-8641 vulnerability, due to which he gained access to the user’s accounts and passwords…