Unit42 Palo Alto Network has discovered a new version of PlugX, which is able to infect and spread via USB devices, replacing ANDROMEDA and Raspberry Robin.
Malicious files are hidden using a new technique that works even in the latest Windows OS. The user will not know that their USB device is...
Hive Systems has conducted another study on brute-force password cracking. This time, experts focused on the Bcrypt algorithm.
Hive Systems, which specializes in cybersecurity, has been testing password cracking using brute-force attacks for several years. All this time, the object of research...
Colonel Zakharchenko's record broken in absentia
Ex-colleagues of an employee of the Ministry of Internal Affairs are being sought for a bribe of 5 billion rubles
As it became known to Kommersant, the record for the amount of bribes set in the Ministry of Internal Affairs by ex-Colonel Dmitry...
Think twice before completing a test task for the job you like.
Researchers have discovered a hacking campaign called Dev Popper aimed at software developers. Attackers disguise themselves as employers and send out fictitious vacancies for IT specialists. Their real goal is to introduce a...
How romantic scammers play on the fears of lonely hearts.
Cybercrime groups have found a new way to deceive people using dating sites and apps. Attackers play on users 'fears of the dangers of online dating and convince them to pass fake "verification" through special applications. This allows...
Employees of the Department for Combating Cybercrime of the Brest region detained a 20-year-old resident of Ivatsevichi.
The young man offered his friends to apply for bank cards for a fee, the data of which was then sent to an anonymous customer from the Internet.
It is established that for a...
Kazakhstan's law enforcement agencies have opened criminal cases against the heads of structural divisions of the Eolus pyramid scheme in 10 regions of the country. This is reported by the local Financial Monitoring Agency.
According to the investigation, the company attracted clients under the...
The attackers created a fake online store that sold mobile phones and computers. Receiving a subscription for the product, the suspects interrupted communication with customers.
25 people, including military personnel, suffered from illegal actions of fraudsters. The total amount of losses is...
The Brest Regional Prosecutor's Office has filed a criminal case against a resident of Minsk, born in 2004, who is charged with embezzlement of property by modifying computer information as part of an organized group.
According to the case file, the accused no later than April 2022 joined a...
Employees of the Department for Organizing the fight against the illegal use of information and Communication Technologies of the Main Directorate of the Ministry of Internal Affairs of Russia in the Novosibirsk region, with the strong support of fighters of the regional Department of Regardie...
"The investigator of the Department for Investigation of Organized Criminal Activities of the Investigative Department of the Ministry of Internal Affairs of Russia has completed a preliminary investigation of the criminal case against ten defendants. Depending on their role and degree of...
The SSLoad malware has become one of the main tools in the arsenal of cybercriminals.
Cybersecurity researchers have identified an ongoing cyberattack campaign that uses phishing emails to spread malicious software called SSLoad. The campaign is codenamed FROZEN # SHADOW and includes the use of...
Vulnerabilities in popular smartphone keyboards allow you to see what the user is typing.
Citizen Lab identified vulnerabilities in popular keyboard applications that can be used to register keystrokes of Chinese users around the world. Security issues are present in almost all apps, including...
The cyber protection of the world's first public wallet leaves much to be desired.
Cybercrime group CiberInteligenciaSV published on BreachForums part of the source code of the Chivo bitcoin wallet used by the government of El Salvador. The publication appeared on the forum on April 23.
"This...
How Google Chrome updates help you remotely control a victim's phone.
ThreatFabric identified it A new malicious application called Brokewell that can record every action on your device, from tapping to typing and launching apps. The Trojan is distributed via a fake update Google Chrome in the...
The "Dream Job" operation does not slow down, using a long chain to hide the infection.
Lazarus Group, a prominent hacker group traditionally associated with North Korea, used tempting job offers to deliver a new remote access trojan (RAT) called Kaolin RAT as part of attacks targeting specific...
Hackers carefully hide the traces of an attack and prevent competition.
Cybercriminals have started exploiting a critical vulnerability in the WP Automatic plugin for WordPress, which allows you to create accounts with administrative privileges and install backdoors for long-term access.
The...
In February 2024, an 86-year-old local resident turned to the police of the Kalininsky district of St. Petersburg with a statement about fraud. As it was established, phone scammers called the pensioner and reported that someone was trying to steal money from her account. Under the pretext of...
Due to a hacker attack on a Swedish logistics company, store shelves with strong alcohol will be emptied across the country. This was stated by the only Swedish retailer of alcoholic beverages. The same problem will affect other Scandinavian countries.
You need to stop drinking to get a...
Employees of the Department for combating the illegal use of Information and Communication Technologies of the Primorsky Krai Department of the Ministry of Internal Affairs of the Russian Federation, together with colleagues from the regional Federal Security Service of Russia, as a result of...