News, Tips, Security Lab

MSMQ Security Flaw Allows RCE

MSMQ Vulnerability Allows Remote Code Execution

Recent update released by Microsoft, an April Patch Tuesday, revealed a severe vulnerability in Microsoft Message Queueing mechanism. That vulnerability…

Hackers Infect eFile Tax Filing Service with Malware

The eFile service, used by many Americans to file their tax returns and authorized by the US Internal Revenue Service…

Top 3 Vulnerabilities of 2023: How to Block and Prevent

Any successful cyber attack begins with penetrating the target network. Cybercriminals must overcome network defenses, whether it’s a stealer, ransomware,…

Rilide Malware Steals Data from Chromium Browsers

Trustwave SpiderLabs specialists spoke about the new Rilide malware, which steals confidential data and cryptocurrency, targeting Chromium browsers. Basically, Rilide…

Rorschach Ransomware Analysis

Recent research from the CheckPoint Research team revealed a new ransomware sample that can potentially beat all samples currently present…

FlyTrap Android malware

FlyTrap Android malware compromised over 10,000 Facebook accounts

According to experts from Zimperium, Android malware FlyTrap hijacks Facebook accounts in 140 countries around the world by stealing session cookies. Worse, the researchers found that the stolen information was…

Ukrainian fighters against pirates

Ukrainian fighters against pirates asked Google to block 127.0.0.1

The TorrentFreak media reports that Vindex, Ukrainian fighters against pirates, representing the interests of TRC Ukraine, sent Google a strange request to remove content from search results. One of the…

RansomEXX attacked Gigabyte

RansomEXX ransomware attacked Gigabyte

RansomEXX ransomware operators attacked a large Taiwanese computer hardware manufacturer Gigabyte. The hackers are currently threatening to release more than 112GB of data stolen from the company if it does…

Vulnerabilities in Amazon Kindle

Vulnerabilities in Amazon Kindle Allowed Taking Full Control of the Device

Check Point researchers reported that in April of this year, IT giant Amazon eliminated critical vulnerabilities in the Amazon Kindle. The problems could be used to gain full control over…

Google fired employees

Google fired dozens of employees for data abuse

The Vice Motherboard has obtained internal Google documents stating that the company has fired dozens of employees for data abuse. The documents describe investigations into cases where Google employees used…

New BlackMatter ransomware

The new BlackMatter ransomware was created by the authors of recently “closed” DarkSide

Last week, experts noticed the emergence of a new ransomware BlackMatter, which combines the “best” features of the now defunct DarkSide and REvil. In particular, the analysts of Recorded Future…

PwnedPiper problem

The PwnedPiper problem poses a threat to 80% of US hospitals

Armis company has released details of nine vulnerabilities collectively known as the PwnedPiper problem. The problem affects medical equipment installed in about 80% of large hospitals in North America. The…

malware under the mask of the Brave

Scammers spread malware under the mask of the Brave browser

Google specialists stopped a malicious advertising campaign in which scammers lured users to a fake Brave browser site, where ArechClient (SectopRAT) malware was hiding under the mask of a browser.…

most attacked vulnerabilities

Experts published a list of the most attacked vulnerabilities in 2020-2021

Experts from the FBI, the US Department of Homeland Security (DHS CISA), the Australian Cybersecurity Center (ACSC), and the UK National Cybersecurity Center (NCSC) have published joint security advisories that…

BlackMatter ransomware attacks

BlackMatter ransomware attacks companies with revenues above $100 million

Recorded Future analysts have discovered a new hack group accompanying the BlackMatter ransomware that attacks large companies and combines the “best” features of the now defunct DarkSide and REvil. Researchers…

malware and unusual programming languages

Malware developers increase use of the unusual programming languages

BlackBerry Research & Intelligence analysts have found that criminals are increasingly turning to unusual and exotic programming languages while working on malware, thus making it difficult to analyse their malware,…

mining malware LemonDuck

Microsoft reported about activity of the LemonDuck malware

Microsoft researchers have published a detailed analysis of the LemonDuck mining malware and reported that cross-platform malware continues to improve. LemonDuck is capable of attacking Windows and Linux, exploits old…