News, Tips, Security Lab
Facts to Remember About Trojan Malware
In this article, we will consider one of the vilest, unpleasant, seemingly harmless, malware. We will present you here all…
Threat Actors Exploit MSDT Follina Bug To Drop RAT And Infostealer
Specialists warn users over recently revealed vulnerability exploitation found in all supported versions of Windows. It has been observed that…
New Cuba Ransomware Variant Involves Double-Extortion Scheme
What’s new in April Variant of Cuba Ransomware The Cuba ransomware family has got itself a new specimen. The new…
The Heuristic Virus & Analysis: Everything You Need To Know
This article is for those who have seen the notification on their computer that there is a heuristic virus in…
Evil Corp Switched to Using LockBit Malware to Avoid Sanctions
The Evil Corp group switched to using the LockBit ransomware to avoid sanctions imposed earlier by the Office of Foreign…
Citrix releases new patches, racing with the hackers that install encryptors on vulnerable machines
Destructive race: Citrix releases new patches, and hackers are actively attacking vulnerable servers and installing encryption engines on them. It seems that users are losing. At the beginning of this…
Windows 7 users will not receive a patch for critical vulnerability in the IE
Microsoft said Windows 7 users would not receive a patch for a critical vulnerability in IE. The fix will be available only to Windows 7 users who paid for extended…
Windows EFS can help encryptors and make work of antiviruses more difficult
Safebreach Labs reported that attackers could use the Windows Encrypting File System (EFS) for their needs. Windows EFS can help encryptors and make work of antiviruses more difficult. EFS has…
Temporary patch for 0-day vulnerability in Internet Explorer arrived on the Internet
Earlier this week, Microsoft announced about vulnerability in Internet Explorer, which is already exploited for “limited targeted attacks”. Now arrived temporary patch for this 0-day vulnerability in Internet Explorer. The…
Government hackers attacked companies more often in 2019
Organizations are more likely to become victims of state-sponsored cybercriminals. Government hackers in 2019 began to attack companies around the world more often. 25% of companies associate attacks on their…
Unknown hacker patches vulnerable Citrix servers
Recently, in the public domain appeared exploits for the critical vulnerability CVE-2019-19781, earlier found in the Citrix Application Delivery Controller (NetScaler ADC) and Citrix Gateway (NetScaler Gateway). Now it was…
Greta Thunberg became the most popular character in phishing campaigns
Check Point analysts prepared a traditional monthly report on the most active threats, the Global Threat Index. Greta Thunberg and Christmas became the most popular topics in spamming and phishing…
IS specialist introduced a PoC exploit for one of the most dangerous vulnerabilities in Windows
The day after the release of the fix for one of the most dangerous vulnerabilities in the history of Windows, security researcher Saleem Rashid demonstrated how it can be used…
Microsoft released farewell updates for Windows 7 and Windows Server 2008
On January 14, 2020, Microsoft stopped supporting Windows 7 for PCs of private users, and at the same time finally finished support of the mobile Windows 10 Mobile (1709), but…
Fancy Bear attacked Ukrainian oil and gas company Burisma
The cybercriminal group Fancy Bear (also known as APT28) attacked Burisma. Hackers that are associated with Russian intelligence organized a phishing campaign aimed at employees of the Ukrainian oil and…
Cable Haunt Vulnerability Threats Millions of Modems with Broadcom Chips
Danish researchers have published a report on the Cable Haunt vulnerability that threats millions of cable modem with Broadcom chips. According to experts, the problem threatens more than 200 million…
Researcher remotely hacked iPhone using only one vulnerability
Researcher in a few minutes remotely hacked iPhone using only Apple ID and exploiting only the CVE-2019-8641 vulnerability, due to which he gained access to the user’s accounts and passwords…