News, Tips, Security Lab

SLP Vulnerability Creates New DDoS Opportunities

New SLP Vulnerability Allows 2200x DDoS Amplification

A recently-discovered vulnerability in SLP, a legacy network protocol, can be used for disastrous increasing in DDoS-attack efficiency. As researchers…

Supply Chain Attack Leads to 3CX Hack and Other Supply Chain Attacks

An investigation into a supply chain attack that hit 3CX last month found that the incident was caused by another…

Capita Hacked, Black Basta Gang Publishes Data

Capita, a London-based international business process outsourcing company, was hacked recently. Users noticed strange events in the company earlier this…

Medusa Groups Claims That It “Merged” the Source Code of Bing and Cortana into the Network

Medusa extortionist group claims to have published internal materials stolen from Microsoft, including the source codes of Bing, Bing Maps…

Chinese Hackers Use Google Command & Control Capabilities in Attacks

Google experts have warned that the Chinese “government” hack group APT41 is abusing the red team’s GC2 (Google Command and…

run out of cheese

Dutch shops run out of cheese due to a ransomware attack

Storage and shipping company Bakker Logistiek suffered a ransomware attack…

Rust one of the languages for Android

Rust will become one of the main development languages for Android due to security

This week, Google developers announced that Rust will become one…

UseCrypt Messenger filed a lawsuit

UseCrypt Messenger developers filed a lawsuit against IS researcher for finding bugs

The developers of the encrypted UseCrypt Messenger have filed a…

New hCaptcha bypass method

New hCaptcha bypass method may not affect Cloudflare’s security

In March 2021, researchers at the University of Louisiana at…

operation against cheat developers

Tencent and Chinese police conducted a joint operation against game cheat developers

Chinese police in collaboration with tech giant Tencent have launched…

Facebook users information leaked

Information of 533 million Facebook users leaked to the public

Last weekend it became known that information of more than…

Hackers bypass firewalls

Hackers Bypass Firewalls Using Windows Feature

Hackers now bypass firewalls using a legitimate component of the…

hacking the system of a water utility

Kansas resident charged with hacking water utility computer system

This week, the US Department of Justice indicted Wyatt Travnichek,…

DDoS attacks becoming the norm

Akamai Says Powerful DDoS Attacks Are Becoming the Norm

According to Akamai’s calculations, powerful ransomware DDoS attacks are becoming…

Hackers on behalf of Brian Krebs

Hackers attack Microsoft Exchange servers on behalf of Brian Krebs

The well-known information security expert, journalist and author of the…

bypass protection from Specter

New vulnerabilities help to bypass protection from Specter on Linux systems

On Monday, March 29th, security researchers uncovered two vulnerabilities in…