News, Tips, Security Lab

Malvertising in Google Search ads - What is That?

Google Search Malvertising: Fake Ads of Free Programs in Google Ads

Google Search malvertising is an unpleasant phenomenon of malicious advertisements in search engine results. Ads up there are called to…

Russian Cybercriminals Seek Access to OpenAI ChatGPT

Check Point analysts have noticed that Russian-speaking hacker forums are actively discussing access to bypass geo-blocking, due to which the…

Goose Goose Duck Game Servers Are DDoS-Attacked Every Day

The free social detective Goose Goose Duck, which recently broke the Among Us record for the number of users simultaneously…

Exploits for Vulnerabilities in Three Popular WordPress Plugins Appeared on the Network

Three popular WordPress plugins, with tens of thousands of active installations, at once turned out to have critical SQL injection…

Microsoft’s VALL-E AI Is Able to Imitate a Human Voice in a Three-Second Pattern

Microsoft engineers have introduced an AI (artificial intelligence) model for text-to-speech called VALL-E. It is able to imitate a human…

google adsense

Google AdSense users receive threat emails

Intruder sends threatening and ransom letters to website owners and…

FSF sent to Microsoft HDD

FSF sent Microsoft developers an empty HDD for Windows 7 sources

The Free Software Foundation (FSF) sent Microsoft developers an empty…

Samsung amends Android kernel

Samsung amends Android kernel that impair security

Jann Horn, Google Project Zero Specialist, studied the Android kernel,…

Xhelper Trojan remains on device

Xhelper Trojan remains on the device even after resetting to factory settings

Xhelper malware continues to infect Android devices. Moreover, the Xhelper…

Microsoft recommends disabling SMBv1

Microsoft recommends Exchange administrators to disable SMBv1

Microsoft strongly recommends administrators disable the SMBv1 protocol on Exchange…

0-day vulnerability in Internet Explorer

Microsoft fixed 0-day vulnerability in Internet Explorer and 99 more bugs in its products

Recent February “update Tuesday” became the largest for Microsoft in…

Increase of supply chains attacks

FBI warned about increase of supply chains attacks

The FBI has warned private sector companies of an active…

Trojan Emotet spread via Wi-Fi

Trojan Emotet is trying to spread through available Wi-Fi networks

Binary Defense analysts noticed that the new version of the…

Dangerous Vulnerability in Citrix Software

Dangerous vulnerability in Citrix software is still not resolved in 20% of companies

A month after the publication of information about a dangerous…

Lemon Duck Malware

Lemon Duck malware operators attack IoT vendors

TrapX Security company experts warned about a new malicious campaign.…

Dangerous vulnerabilities in WhatsApp

Dangerous vulnerabilities in WhatsApp allowed compromising millions of users

Security researcher Gal Weizman from PerimeterX disclosed technical details of…

Cybercriminals use pirated software

Cybercriminals increasingly use pirated software to deliver backdoors and ransomware

Cybersecurity experts once again warn that while pursuing for free…