Security News

New BHUNT malware hunts for cryptocurrency wallets

New BHUNT malware hunts for cryptocurrency wallets

Bitdefender researchers talked about a new modular BHUNT malware that steals the contents of cryptocurrency wallets, passwords and secret phrases.…

Companies in the EU will have to remove Google Analytics from their websites

Companies in the European Union will have to remove Google Analytics from their websites or face fines for violating the…

Cybersecurity researchers discovered Chinese hack group Earth Lusca

According to a Trend Micro report, the Chinese cyber-espionage hack group Earth Lusca not only monitors strategic targets, but also…

The Facebook Pixel Hunt

Mozilla, a browser maker, these days introduced its collaboration with a non-earnings newsroom Markup. The collective efforts of companies could…

Microsoft discovered the WhisperGate wiper attacking Ukrainian users

Microsoft discovered the WhisperGate wiper attacking Ukrainian users

Microsoft says it discovered a destructive attack on Ukrainian users using the WhisperGate wiper, which tried to impersonate a ransomware, but in fact did not provide victims with data recovery…

Most likely russian hackers defaced Ukrainian government websites

Most likely russian hackers defaced Ukrainian government websites

Hackers defaced several Ukrainian government websites: the attack occurred on the night of January 13-14 and affected the websites of the Ukrainian Foreign Ministry, the Ministry of Education and Science,…

Teen gets remote access to 25 Tesla cars

Teen gets remote access to 25 Tesla cars

19-year-old David Colombo said on Twitter that he gets remote access to 25 Tesla cars in 13 countries around the world. According to him, the problem was not with the…

Critical vulnerability in Office fixed, but macOS update is delayed

Critical vulnerability in Office fixed, but macOS update is delayed

As part of the January Patch Tuesday, Microsoft engineers fixed a critical vulnerability in Office that could allow attackers to remotely run malicious code on vulnerable systems. The RCE vulnerability…

Vulnerability in macOS Leads to Data Leakage

Vulnerability in macOS Leads to Data Leakage

Microsoft said that attackers could use a macOS vulnerability to bypass Transparency, Consent, and Control (TCC) technology and gain access to protected user data. Back in the summer of 2021,…

Spy method NoReboot allows simulating iPhone shutdown and prying through the camera

Spy method NoReboot allows simulating iPhone shutdown and prying through the camera

The NoReboot spy method allows intercepting the iPhone restart and shutdown process and prevent them from ever happening. ZecOps has developed a new method to simulate restarting or shutting down…

Chinese hack group Aquatic Panda exploits Log4Shell to hack educational institutions

Chinese hack group Aquatic Panda exploits Log4Shell to hack educational institutions

Specialists of information security company CrowdStrike warn: the Chinese cyber-espionage hack group Aquatic Panda uses the Log4Shell vulnerabilities, with the help of which a large educational institution was compromised. Let…

Volvo Cars under Snatch attack

Volvo Cars under Snatch attack

In its press release, Volvo Cars, a Swedish multinational luxury vehicle manufacturer based in Torslanda, Gothenburg, reported unlawful third party access to its records. Upon discovery of the violation, the…

Experts hacked Bluetooth test for COVID-19

Experts hacked Bluetooth test for COVID-19

Researchers at F-Secure hacked a home Bluetooth COVID-19 test and were able to fake the test result. For testing, the experts took the Ellume COVID-19 Home Test device, which uses…