News, Tips, Security Lab

Proxyjacking - A New Tactic Of Old Hackers

Proxyjacking: The Latest Cybercriminal Invention In Action

Today, in the constantly changing world of cyber threats, attackers always look for new ways to get more benefits with…

PlugX malware attacks European diplomats

Over the past few months, researchers have been monitoring the activity of a Chinese threat actor using PlugX malware to…

Snappy Tool Helps Avoid Fraudulent Wi-Fi Hotspots

Trustwave has created a Snappy tool that will make it easy to determine if the Wi-Fi network is fake or…

RustBucket Malware Attacks MacOS More Effectively

New update of RustBucket Malware introduced several changes. Now the malware is more securely fixed in the systems of its…

Akira Ransomware Decryptor Is Available To The Public

Cybersecurity experts have released a decryptor for the Akira ransomware. It will allow victims who encounter attacks to decrypt their…

Ransom Extortion

Companies Manage to Bargain With Ransomware Racketeers

Revelations of the Ransom-Negotiator In May, the racketeer-bargaining specialist (the negotiator) at a European production company had received an unexpected chat message from a malefactor who had hacked the specialist’s…

DOJ

The US Department of Justice Reports a Russian Botnet Dismantled

RSOCKS Russian Botnet Is No More as a Result of a Joint Operation According to the June 16 report by the US Department of Justice, the activity of a Russian…

Types of Cyber Security Attacks in IoT

10 Types of Cyber Security Attacks in IoT

In a world where information progress is rapidly developing, it is impossible to do without IoT. You probably don’t know what you’re talking about, so let’s take a quick look…

Microsoft fixes Follina vulnerability

Microsoft Fixed Follina Vulnerability and 55 Other Bugs

As part of the June Patch Tuesday, Microsoft finally fixed the Follina Critical Vulnerability associated with Windows MSDT, and fixed 55 more bugs in its products. As a reminder, Follina…

penetration testing

Penetration Testing: Stages and Methods

What is penetration testing? Penetration testing is a method by which the security of computer systems and networks can be assessed by simulating a hacker’s attack. It is possible to…

Interpol Operatives

Around 2000 People Arrested by Interpol for Internet Scams

Operation “First Light” The war on cybercrime goes on. As its next round unwinds in 2022, Interpol arrests hundreds of Internet-fraud-related suspects within two months. The operation in question got…

VPN, Proxy, or Tor

VPN, Proxy, or Tor: Differences, Meaning

You’ve probably heard the words VPN, Proxy, and Tor. You may even regularly use these technologies to remain anonymous, bypass blockades, view content blocked in your region, or simply access…

BlackCat ransomware gang publishes leaked data on the clear web site

BlackCat ransomware gang publishes leaked data on the clear web site

BlackCat/ALPHV group recently announced on its victim shaming and extortion website that it had hacked into a luxury spa and resort in the Western United States. At one moment in…

War in Ukraine triggered a Stream of amateurish ransomware

War in Ukraine triggered a Stream of amateurish ransomware

Russia has provoked hackers around the world to focus their attacks on the servers of the largest companies, TV channels, banks, and government agencies. According to the statistics given by…

Difference Between Polymorphic and Metamorphic Viruses

Difference Between Polymorphic and Metamorphic Viruses

Polymorphic and Metamorphic Malware: the Comparison In this article, we consider two types of pests: polymorphic and metamorphic viruses, which were designed to destroy the integrity of the operating system…

The US Will Introduce A Cyber Army Into Its Military Units

The US Will Introduce A Cyber Army Into Its Military Units

By 2030 the US plans to double the size of its military cyber units. The Pentagon prepares for future battles that will involve military operations on the cyber field. The…

Iranian Spear-Phishing Operation Targets US And Israeli High Executives

Iranian Spear-Phishing Operation Targets US And Israeli High Executives

In a wake of rising tensions between Israel and Iran, researchers from Check Point Research (CPR) discovered numerous attempts of spear phishing attacks from the supposedly Iranian Phosphorus APT group.…