News, Tips, Security Lab

heads of cybersecurity departments

Nearly 50% of Cybersecurity Leaders Will Change Jobs by 2025

According to a new report from Gartner, by 2025, nearly 50% of cybersecurity leaders will change jobs, and 25% will…

One Year of Russian-Ukrainian War in Cybersecurity

February 24, 2022, will be a turning point in history. It was the day of the full-scale Russian invasion of…

Hackers Broke into Activision’s Slack and Stole Data

Activision, the publisher of computer games (including the Call of Duty franchise), reported a security breach that occurred back in…

Five Easy Smartphone Security Tips to Keep It Safe From Hackers

These days, the smartphone is more than just a means of communication. Every day we use it to communicate with…

How DDoS Can Badly Hurt Your Business

Everyone at least once faced the fact that they cannot go to the desired site or use some service. This…

run out of cheese

Dutch shops run out of cheese due to a ransomware attack

Storage and shipping company Bakker Logistiek suffered a ransomware attack and run out of cheese in some Dutch stores. The fact is that Bakker Logistiek is one of the largest…

Rust one of the languages for Android

Rust will become one of the main development languages for Android due to security

This week, Google developers announced that Rust will become one of the main Android development languages as it has greater security and will prevent emergence of memory bugs. For this,…

UseCrypt Messenger filed a lawsuit

UseCrypt Messenger developers filed a lawsuit against IS researcher for finding bugs

The developers of the encrypted UseCrypt Messenger have filed a lawsuit against Polish IS researcher Tomasz Zieliński, editor of the blog Informatyk Zakładowy. The fact is that in the fall…

New hCaptcha bypass method

New hCaptcha bypass method may not affect Cloudflare’s security

In March 2021, researchers at the University of Louisiana at Lafayette presented a paper on a new hCaptcha bypass method that replaced reCAPTCHA in Cloudflare and Google last year. Experts…

operation against cheat developers

Tencent and Chinese police conducted a joint operation against game cheat developers

Chinese police in collaboration with tech giant Tencent have launched a joint operation against cheat developers. 10 developers of 17 different cheating tools in games (including Overwatch and Call of…

Facebook users information leaked

Information of 533 million Facebook users leaked to the public

Last weekend it became known that information of more than 500 million Facebook users leaked to the public. On the hacker forum, the data about 533 313 128 Facebook users…

Hackers bypass firewalls

Hackers Bypass Firewalls Using Windows Feature

Hackers now bypass firewalls using a legitimate component of the Windows operating system called Background Intelligent Transfer Service (BITS), installing malware into it. In 2020, hospitals, medical centres and nursing…

hacking the system of a water utility

Kansas resident charged with hacking water utility computer system

This week, the US Department of Justice indicted Wyatt Travnichek, a 22-year-old Kansas resident, with hacking into the computer system of a local water utility. Authorities say Travnichek hacked into…

DDoS attacks becoming the norm

Akamai Says Powerful DDoS Attacks Are Becoming the Norm

According to Akamai’s calculations, powerful ransomware DDoS attacks are becoming the norm. Although they fall short of past records (recall last year’s 2.54 TB/sec attack or 1.35 TB/sec attack in…

Hackers on behalf of Brian Krebs

Hackers attack Microsoft Exchange servers on behalf of Brian Krebs

The well-known information security expert, journalist and author of the KrebsOnSecurity blog has repeatedly become a target for attacks and mockery of hackers. Now hackers are attack Microsoft Exchange servers…

bypass protection from Specter

New vulnerabilities help to bypass protection from Specter on Linux systems

On Monday, March 29th, security researchers uncovered two vulnerabilities in Linux distributions that help to bypass protection from speculative attacks like Specter and extract sensitive information from kernel memory. Vulnerabilities…

bugs in the 5G protocol

Experts have discovered bugs in the 5G protocol that allow tracking location and arranging of DoS attacks

AdaptiveMobile specialists have published a report on new bugs in the 5G protocol, thanks to which it is possible to disable network segments (DoS) and steal user data, including location…