News, Tips, Security Lab

Blue Screen of Death Scams

Fake BSOD Scams Target Users Visiting Fake Adult Sites

The blue screen of death is probably the most unpleasant thing Windows users may ever see. In most cases, it…

New Acer Breach Exposes 160GB of Data

Companies tend to hide the case of a cybersecurity breach – for certain reasons, it may be for their good.…

СhatGPT Became a Source of Phishing

As the digital world continues to evolve, so do the tactics of online scammers who seem to have an unending…

BlackLotus UEFI Bootkit Bypasses Protection even in Windows 11

ESET experts reported that the BlackLotus UEFI bootkit, which is sold on hacker forums for about $ 5,000, is indeed…

New stealthy “Beep” malware focuses heavily on evading detection

Cybercriminals periodically develop something new. Sometimes it is an updated version of already known malware, and sometimes it is something…

Valve RCE vulnerability

Valve was unable to fix an RCE vulnerability in the Source engine for a long time

A security research group known as the Secret Club claims that Valve’s Source engine games are vulnerable to an RCE vulnerability. One researcher says that Valve engineers were informed about…

run out of cheese

Dutch shops run out of cheese due to a ransomware attack

Storage and shipping company Bakker Logistiek suffered a ransomware attack and run out of cheese in some Dutch stores. The fact is that Bakker Logistiek is one of the largest…

Rust one of the languages for Android

Rust will become one of the main development languages for Android due to security

This week, Google developers announced that Rust will become one of the main Android development languages as it has greater security and will prevent emergence of memory bugs. For this,…

UseCrypt Messenger filed a lawsuit

UseCrypt Messenger developers filed a lawsuit against IS researcher for finding bugs

The developers of the encrypted UseCrypt Messenger have filed a lawsuit against Polish IS researcher Tomasz Zieliński, editor of the blog Informatyk Zakładowy. The fact is that in the fall…

New hCaptcha bypass method

New hCaptcha bypass method may not affect Cloudflare’s security

In March 2021, researchers at the University of Louisiana at Lafayette presented a paper on a new hCaptcha bypass method that replaced reCAPTCHA in Cloudflare and Google last year. Experts…

operation against cheat developers

Tencent and Chinese police conducted a joint operation against game cheat developers

Chinese police in collaboration with tech giant Tencent have launched a joint operation against cheat developers. 10 developers of 17 different cheating tools in games (including Overwatch and Call of…

Facebook users information leaked

Information of 533 million Facebook users leaked to the public

Last weekend it became known that information of more than 500 million Facebook users leaked to the public. On the hacker forum, the data about 533 313 128 Facebook users…

Hackers bypass firewalls

Hackers Bypass Firewalls Using Windows Feature

Hackers now bypass firewalls using a legitimate component of the Windows operating system called Background Intelligent Transfer Service (BITS), installing malware into it. In 2020, hospitals, medical centres and nursing…

hacking the system of a water utility

Kansas resident charged with hacking water utility computer system

This week, the US Department of Justice indicted Wyatt Travnichek, a 22-year-old Kansas resident, with hacking into the computer system of a local water utility. Authorities say Travnichek hacked into…

DDoS attacks becoming the norm

Akamai Says Powerful DDoS Attacks Are Becoming the Norm

According to Akamai’s calculations, powerful ransomware DDoS attacks are becoming the norm. Although they fall short of past records (recall last year’s 2.54 TB/sec attack or 1.35 TB/sec attack in…

Hackers on behalf of Brian Krebs

Hackers attack Microsoft Exchange servers on behalf of Brian Krebs

The well-known information security expert, journalist and author of the KrebsOnSecurity blog has repeatedly become a target for attacks and mockery of hackers. Now hackers are attack Microsoft Exchange servers…

bypass protection from Specter

New vulnerabilities help to bypass protection from Specter on Linux systems

On Monday, March 29th, security researchers uncovered two vulnerabilities in Linux distributions that help to bypass protection from speculative attacks like Specter and extract sensitive information from kernel memory. Vulnerabilities…