Security News

Vulnerability in Apple iCloud puts billion users at risk

Vulnerability in Apple iCloud puts billion users at risk

Security of over a billion iPhone owners and users of popular instant messengers is at risk due to a vulnerability…

US Cyber ​​Command confirms cyberattacks against ransomware

The United States Cyber Command has publicly recognized the use of offensive actions (cyberattacks) in order to neutralize cybercriminal groups…

FBI study guide showed what data law enforcement officers can get from instant messengers

An FBI study guide has been made publicly available as part of a Freedom of Information law request filed by…

Hackers introduced a web skimmer on the site of the Sealand Principality

The Record reported that unknown hackers attacked the site of the Sealand Principality (a self-proclaimed virtual state in the North…

Unofficial fixes released for 0-day issue in Windows Mobile Device Management Service

Unofficial fixes released for 0-day issue in Windows Mobile Device Management Service

Unofficial fixes released for 0-day issue in Windows Mobile Device Management Service Access to Work or School. The problem is present on devices running Windows 10, version 1809 (and later).…

Ukrainian law enforcement officers arrested members of the hacker group Phoenix

Ukrainian law enforcement officers arrested members of the hacker group Phoenix

The Security Service of Ukraine (SBU) announced the arrest of five members of the international hacker group Phoenix, which specializes in remote hacking of mobile devices and collection of personal…

Cybersecurity researchers published an exploit for Windows that allows escalating privileges

Cybersecurity researchers published an exploit for Windows that allows escalating privileges

Bleeping Computer reported that cybersecurity researcher has published an exploit for a new zero-day vulnerability that can be used to escalate local privileges in all supported versions of Windows, including…

Researchers have suggested using smartphones to find hidden cameras

Researchers have suggested using smartphones to find hidden cameras

A team of researchers from the National University of Singapore and Yonseo University have described an interesting concept: the use of time-of-flight (ToF) sensors in modern smartphones to find hidden…

Researchers noticed that the darknet is discussing exploits as a service

Researchers noticed that the darknet is discussing exploits as a service

Analysts at Digital Shadows have prepared a report on the exploit market on the darknet – it is noticed that the criminals have come up with an “exploits as a…

New Rowhammer Attack Breaks DDR4 Memory Protection

New Rowhammer Attack Breaks DDR4 Memory Protection

Researchers have unveiled a new fuzzing attack technique, Blacksmith, which proves that a Rowhammer attack on DDR4 memory is possible and bypasses existing defense mechanisms. It is worth noting that…

Hackers broke into FBI mail server and sent fake cyberattack alerts

Hackers broke into FBI mail server and sent fake cyberattack alerts

Last weekend, unknown hackers managed to broke into the mail server of the Federal Bureau of Investigation (FBI). Hackers used the access to send letters that imitated FBI alerts about…

Clop ransomware exploits vulnerability in SolarWinds Serv-U

Clop ransomware exploits vulnerability in SolarWinds Serv-U

The NCC Group warns of a spike of Clop ransomware attacks (hack group also known as TA505 and FIN11), which exploits a vulnerability in SolarWinds Serv-U. Most of them start…

NUCLEUS: 13 Problems Threat to Medical Devices, Automobiles and Industrial Systems

NUCLEUS: 13 Problems Threat to Medical Devices, Automobiles and Industrial Systems

Forescout and Medigate Labs issued a report on NUCLEUS:13 problems – A Set of 13 vulnerabilities which affect Siemens Software Library that is widely used in medical devices, automotive and…