Category: Information Security
Specialists at Zscaler have identified over 90 malicious applications on Google Play, designed to distribute malware and adware, including the banking trojan Anatsa. These applications have been downloaded more than 5.5 million times. Description...
The U.S. Department of the Treasury has imposed sanctions on a cybercriminal network involving three Chinese nationals and three companies from Thailand. These entities are connected to a major botnet that controls a residential...
A recent leak of thousands of pages of internal Google documents has revealed the true workings of the company’s search algorithm. These documents, which have come into the hands of SEO experts, raise questions...
Check Point, a cybersecurity firm, has urged its clients to review their VPN configurations to prevent potential attacks from malicious actors attempting to access corporate networks. In its May 28th notification, the company highlighted...
A new privilege escalation vulnerability has been discovered in macOS 14 Sonoma, designated as CVE-2024-27842. While the severity of this vulnerability has not yet been determined, it affects all versions of macOS 14.x up...
Scientists have unveiled the details of a powerful and efficient new technique called the “pulsing denial-of-service” (PDoS) attack, which leverages DNS queries and responses to achieve an attack amplification factor of 20,000 times. The...
Over the past three months, hackers behind the CatDDoS botnet have exploited over 80 known vulnerabilities in various software products to infect devices and incorporate them into their network for conducting Distributed Denial-of-Service (DDoS)...
Fraud on classifieds and marketplaces has become a serious issue due to the emergence of organized criminal groups operating under a “Fraud-as-a-Service” model. These groups continuously refine their methods to steal money and personal...
According to a report by Sucuri, unknown hackers are exploiting obscure WordPress plugins to inject malicious PHP code into victim sites and steal payment data. On May 11, Sucuri specialists discovered a campaign in...
Check Point has reported that cybercriminals are targeting Check Point Remote Access VPN devices as part of an ongoing campaign to breach corporate networks. Remote access is integrated into all Check Point network firewalls....
A serious vulnerability has been identified in the TP-Link Archer C5400X gaming router, leading to remote code execution on vulnerable devices through specially crafted requests. The vulnerability, designated CVE-2024-5035, has received the highest possible...
A hacker breached the website of the spyware application pcTattletale, which was found to be installed on registration systems of several Wyndham hotel chain locations in the United States. The attacker posted offensive content...
A massive data breach in India has exposed the biometric data of millions of citizens. An unsecured database containing fingerprints and facial scans of police, military personnel, and civilians was discovered during the general...
Cybercriminals are using the Python code of Microsoft’s legendary game “Minesweeper” to conceal malicious scripts in attacks on financial and insurance organizations in Ukraine. This was reported by the research agencies CERT-UA and CSIRT-NBU,...
A new malicious program, GhostHook v1.0, is rapidly spreading on a cybercriminal forum. This innovative fileless malware for browsers, developed by the hacker group Native-One, is distinguished by its unique distribution methods and versatility,...
A new type of malicious software targeting ATMs is rapidly spreading in the digital realm, remarkable for its effectiveness — its success rate, according to its creators, reaches 99%. This malware, named “EU ATM...