News, Tips, Security Lab
RedEnergy Stealer-as-a-Ransomware On The Rise
Researchers have discovered a new form of malware called RedEnergy Stealer. It is categorized as Stealer-as-a-Ransomware but is not affiliated…
Hackers Actively Exploit the 0-Day Vulnerability in the Ultimate Member WordPress Plugin
Hackers actively exploit a zero-day vulnerability in the WordPress plugin Ultimate Member to increase privileges: with the help of this…
BlackCat Ransomware Employs Malvertising In Targeted Attacks
Recently malicious actors started using malvertising to spread BlackCat ransomware. They use cloned webpages of popular freeware applications, particularly WinSCP…
MITRE Compiled a List of the 25 Most Dangerous Bugs
MITRE specialists have published a list of the 25 most dangerous bugs in software over the past two years. It…
The Number of Companies Affected by Attacks on Vulnerabilities in MOVEit Transfer Increased
The consequences of exploiting a 0-day vulnerability in MOVEit Transfer’s file transfer management solution continue to spread. The total number…
DNS Cache Poisoning and DNS Spoofing
DNS poisoning and spoofing is a cyberattack that exploits vulnerabilities in DNS servers to redirect traffic from legitimate servers to fake ones. Once exposed to a fake page, you may…
Nine Web Scammers Arrested by Dutch Police in a Europol Operation
Nine Internet scammers arrested in the Netherlands during Dutch-Belgian joint operation Belgium and the Netherlands have conducted a Europol-supported operation to neutralize a group of cybercriminals. Malefactors made millions of…
Russian Hackers Use Follina Vulnerability to Attack Users in Ukraine
The Ukraine Computer Emergency Response Team (CERT-UA) said Russian hackers are exploiting the Follina vulnerability in new phishing campaigns to install CredoMap malware and Cobalt Strike beacons. According to experts,…
Meta to Give up its Discriminating Ad-Targeting System
Meta Cooperates Facing Chargers of Digital Discrimination A historic legal event took place when, after accusations of unlawful discrimination put in the design of the targeted advertising system employed by…
New DFSCoerce PoC Exploit Allows Attackers to Take Over Windows Domains
The recently published DFSCoerce PoC exploit uses the MS-DFSNM file system to take over Windows domains. This exploit is conceptually similar to the sensational PetitPotam attack. Let me remind you…
Ryuk – Devastatingly Effective Targeted Ransomware
Ransomware is a malicious program which an attacker injects into your device to encrypt your data and hold your digital life hostage. Ryuk ransomware is similar to the typical ransomware…
A Former Amazon Employee Charged for Digital Fraud. Sentencing in September
Paige Thompson Faces up to 20 Years for Wire Fraud Paige Thompson, 36, a resident of Seattle, who worked as an engineer in Amazon Web Services, has been charged with…
How to Delete Facebook Account Page Permanently
Before you delete your Facebook account, you should understand the consequences of this. So, here are some of the most relevant things that will happen after removal: [su_list icon=”icon: hand-o-right”…
Spam Email Revenge: Ways to Seek Retribution
Spam Email Revenge: While using the internet, it is impossible to avoid the annoying onslaught of network letters. Scammers persistently attempt to engage you with their ads or worse, by…
Cisco Won’t Fix an RCE Vulnerability in Old RV Routers
A 9.8/10 RCE Vulnerability in Old Cisco RV Routers Will Not Be Patched Cisco will not patch the zero-day CVE-2022-20825 vulnerability on end-of-life devices. The affected devices are Small Business…
Microsoft Has Already Patched a Vulnerability in Windows RDP Twice
This week, CyberArk researchers shared technical information about a named pipe RDP (Remote Desktop Protocol) vulnerability in Windows, for which Microsoft had to release two patches. The RCE vulnerability CVE-2022-21893…
QNAP Warns Clients About DeadBolt Ransomware Attacks
DeadBolt Ransomware: Another Instance of Ransomware Evolution On June 17, QNAP, the Taiwanese hardware manufacturer, warned its customers about ransomware attacks targeting the company’s NAS (network-connected storage) devices. Following attacks…