News, Tips, Security Lab

Attackers using DCCP protocol for DDoS attacks

Attackers using DCCP protocol for DDoS attacks

Akamai has noticed that attackers are using the little-known DCCP network protocol (Datagram Congestion Control Protocol) for DDoS attacks. This…

Check Point: Desperate Job Seekers Are Ready To Work For Cybercriminals

CheckPoint experts found that the number of job search ads on the darknet and on hacker forums is growing -…

REvil ransomware operators attacked Acer and demand $50,000,000

The REvil ransomware attacked the Taiwanese company Acer (the sixth largest computer manufacturer in the world, accounting for about 6%…

Russian who tried to hack Tesla was pleaded guilty

The Russian, who offered a Tesla specialist $1,000,000 for installing malware into the company’s network in Reno, Nevada, was pleaded…

DTLS can amplify DDoS by 37 times

Netscout warns that using of the DTLS vector allows hackers to amplify DDoS attacks by 37 times. The researchers found…

Unknown hacker patches vulnerable Citrix servers

Unknown hacker patches vulnerable Citrix servers

Recently, in the public domain appeared exploits for the critical vulnerability CVE-2019-19781, earlier found in the Citrix Application Delivery Controller (NetScaler ADC) and Citrix Gateway (NetScaler Gateway). Now it was…

Greta Thunberg became the most popular character in phishing campaigns

Greta Thunberg became the most popular character in phishing campaigns

Check Point analysts prepared a traditional monthly report on the most active threats, the Global Threat Index. Greta Thunberg and Christmas became the most popular topics in spamming and phishing…

IS specialist introduced a PoC exploit for one of the most dangerous vulnerabilities in Windows

IS specialist introduced a PoC exploit for one of the most dangerous vulnerabilities in Windows

The day after the release of the fix for one of the most dangerous vulnerabilities in the history of Windows, security researcher Saleem Rashid demonstrated how it can be used…

Microsoft released farewell updates for Windows 7 and Windows Server 2008

Microsoft released farewell updates for Windows 7 and Windows Server 2008

On January 14, 2020, Microsoft stopped supporting Windows 7 for PCs of private users, and at the same time finally finished support of the mobile Windows 10 Mobile (1709), but…

Fancy Bear attacked Ukrainian oil and gas company Burisma

Fancy Bear attacked Ukrainian oil and gas company Burisma

The cybercriminal group Fancy Bear (also known as APT28) attacked Burisma. Hackers that are associated with Russian intelligence organized a phishing campaign aimed at employees of the Ukrainian oil and…

Cable Haunt Vulnerability Threats Millions of Modems with Broadcom Chips

Cable Haunt Vulnerability Threats Millions of Modems with Broadcom Chips

Danish researchers have published a report on the Cable Haunt vulnerability that threats millions of cable modem with Broadcom chips. According to experts, the problem threatens more than 200 million…

Researcher remotely hacked iPhone using only one vulnerability

Researcher remotely hacked iPhone using only one vulnerability

Researcher in a few minutes remotely hacked iPhone using only Apple ID and exploiting only the CVE-2019-8641 vulnerability, due to which he gained access to the user’s accounts and passwords…

Researchers hacked TikTok app via SMS

Researchers hacked TikTok app via SMS

Check Point experts found many issues in one of the world’s most popular applications, TikTok. Recently researchers hacked TikTok app using sms. TikTok is available in more than 150 markets,…

US Homeland Security warns of possible cyberattacks by Iran

US Homeland Security warns of possible cyberattacks by Iran

Homeland Security USA issued a warning about possible acts of terrorism and cyberattacks by Iran in response to the assassination of General Kassem Suleimani, the head of the Quds special…