News, Tips, Security Lab
Barts NHS Trust Hacked by BlackCat/ALPHV Ransomware Group
A Russian cybercriminal gang BlackCat claims to have hacked into one of Britain’s most prominent hospital groups and threatens to…
TeamTNT Group Returns with Silent Bob Campaign
Aqua Security security researchers have warned that the TeamTNT group may be preparing a new large-scale anti-cloud campaign called “Silent…
Proxyjacking: The Latest Cybercriminal Invention In Action
Today, in the constantly changing world of cyber threats, attackers always look for new ways to get more benefits with…
PlugX malware attacks European diplomats
Over the past few months, researchers have been monitoring the activity of a Chinese threat actor using PlugX malware to…
Snappy Tool Helps Avoid Fraudulent Wi-Fi Hotspots
Trustwave has created a Snappy tool that will make it easy to determine if the Wi-Fi network is fake or…
Hackers Launched LockBit 3.0 and Bug Bounty Ransomware
The LockBit ransomware group released the LockBit 3.0 malware, at the same time introduced its own bug bounty ransomware program, and also announced that it would accept ransoms in the…
LockBit Weaponizes Its Victims’ Clients – Brett Callow
Brett Callow, a cybersecurity analyst at Emsisoft, shared information on his Twitter about the broadened tactics the LockBit ransomware group applies to its victims. Imagine a firm gets attacked by…
Phishers Can Bypass Multi-Factor Authentication with Microsoft Edge WebView2
An information security expert known as mr.d0x has developed a new attack technique that abuses Microsoft Edge WebView2 applications to steal authentication cookies. In theory, this allows bypassing multi-factor authentication…
Conti vs. LockBit 2.0 – a Trend Micro Research in Brief
Trend Micro, a Japanese IT security company, has published a thorough comparison of behaviors of two major ransomware groups: Conti and LockBit 2.0. Here you can read a shorter summary…
Conti Ransomware Shutdown, Site Disabled
Conti operators shut down the remnants of the public infrastructure. Two servers on the Tor network that were used to publish victims’ data and negotiate ransoms are down. The Conti…
Copyright Claims Used as Bait by LockBit 2.0 Affiliates in Korea
A new type of email-bait has been invented by the affiliates of LockBit 2.0. Specialists at AhnLab Inc, a South Korean security software company, have noticed that LockBit 2.0 affiliates…
How to Prevent Crimeware Attacks: Users` Guide
You may come across the term “Crimeware” and understandably get confused as you probably thought before that only malware or viruses are the words for the definition of any bad…
NCC Group’s May 2022 Threat Report Reflects Conti’s End
NCC Group’s monthly report on cyber threats features some curious news, namely the alleged closure of ransomware group Conti and the strengthening of the Lockbit 2.0 gang. Conti, a notorious…
Privacy Access Tokens to Replace CAPTCHA Real Soon
CAPTCHA, a well-known test for website visitors to prove they are humans, not robots, rapidly grows obsolete. There are ways to break or bypass CAPTCHA, and there are obvious inconveniences…
Chinese Hackers Use Ransomware As a Cover for Espionage
Secureworks experts have found that Chinese hackers from two groups that specialize in espionage and theft of intellectual property from Japanese and Western companies use ransomware to hide their actions.…
8 Symptoms Of Adware: How to Avoid it
What is adware meaning? It is an agressive software whose goal is to collect marketing information about the user loading them with an avalanche of advertisements, often in the form…
Google Report Companies Creating Mobile Spyware for Governments
Google Reveals An Italian Company to Sell Android and iOS Spyware to Governments In its blog, Google has published a report revealing that multiple companies have been crafting and selling…