News, Tips, Security Lab
Attackers using DCCP protocol for DDoS attacks
Akamai has noticed that attackers are using the little-known DCCP network protocol (Datagram Congestion Control Protocol) for DDoS attacks. This…
Check Point: Desperate Job Seekers Are Ready To Work For Cybercriminals
CheckPoint experts found that the number of job search ads on the darknet and on hacker forums is growing -…
REvil ransomware operators attacked Acer and demand $50,000,000
The REvil ransomware attacked the Taiwanese company Acer (the sixth largest computer manufacturer in the world, accounting for about 6%…
Russian who tried to hack Tesla was pleaded guilty
The Russian, who offered a Tesla specialist $1,000,000 for installing malware into the company’s network in Reno, Nevada, was pleaded…
DTLS can amplify DDoS by 37 times
Netscout warns that using of the DTLS vector allows hackers to amplify DDoS attacks by 37 times. The researchers found…
Unknown hacker patches vulnerable Citrix servers
Recently, in the public domain appeared exploits for the critical vulnerability CVE-2019-19781, earlier found in the Citrix Application Delivery Controller (NetScaler ADC) and Citrix Gateway (NetScaler Gateway). Now it was…
Greta Thunberg became the most popular character in phishing campaigns
Check Point analysts prepared a traditional monthly report on the most active threats, the Global Threat Index. Greta Thunberg and Christmas became the most popular topics in spamming and phishing…
IS specialist introduced a PoC exploit for one of the most dangerous vulnerabilities in Windows
The day after the release of the fix for one of the most dangerous vulnerabilities in the history of Windows, security researcher Saleem Rashid demonstrated how it can be used…
Microsoft released farewell updates for Windows 7 and Windows Server 2008
On January 14, 2020, Microsoft stopped supporting Windows 7 for PCs of private users, and at the same time finally finished support of the mobile Windows 10 Mobile (1709), but…
Fancy Bear attacked Ukrainian oil and gas company Burisma
The cybercriminal group Fancy Bear (also known as APT28) attacked Burisma. Hackers that are associated with Russian intelligence organized a phishing campaign aimed at employees of the Ukrainian oil and…
Cable Haunt Vulnerability Threats Millions of Modems with Broadcom Chips
Danish researchers have published a report on the Cable Haunt vulnerability that threats millions of cable modem with Broadcom chips. According to experts, the problem threatens more than 200 million…
Researcher remotely hacked iPhone using only one vulnerability
Researcher in a few minutes remotely hacked iPhone using only Apple ID and exploiting only the CVE-2019-8641 vulnerability, due to which he gained access to the user’s accounts and passwords…
Researchers hacked TikTok app via SMS
Check Point experts found many issues in one of the world’s most popular applications, TikTok. Recently researchers hacked TikTok app using sms. TikTok is available in more than 150 markets,…
US Homeland Security warns of possible cyberattacks by Iran
Homeland Security USA issued a warning about possible acts of terrorism and cyberattacks by Iran in response to the assassination of General Kassem Suleimani, the head of the Quds special…