November 19, 2021 RedCurl, a group of professional hackers specializing in corporate espionage, has returned with new, sophisticated tools. The new activity was discovered by security researchers from cybersecurity firm Group-IB. According to researchers, the group needed seven more...
November 18, 2021 Security researchers have uncovered a phishing operation targeting high-profile TikTok accounts owned by influencers, brand consultants, production studios and influencer managers. In the first case, actors impersonate TikTok employees, who threatened the recipient with the more...
November 18, 2021 An attempt is being made to bring Chinese hackers on board in a Russian-speaking, RAMP hacker forum. As Flashpoint reports, high-level users and RAMP administrators are actively communicating with new forum members in machine-translated Chinese, more...
November 18, 2021 Recent Nordpass research has identified the top 10 most common passwords, as it has strongly warned users of the danger of using simple passwords. The list of the 10 most common passwords includes "123456," "123456789," more...
November 18, 2021 IT expert Sean Gallagher recently published a list of the most worthless security practices that everyone should avoid. Below are five of the most prolific cybersecurity myths. MYTH 1: Change Your Password Every 30 Days more...
November 17, 2021 Cybersecurity firm Sucuri revealed that nearly 300 WordPress sites were hacked last week with a fake encryption message to entice site owners to pay a fee of 0.1 Bitcoin (~$6,069.23) for restoring their website. In more...
November 16, 2021 Intel has identified two serious vulnerabilities affecting a wide range of Intel processor families that allow cyber criminals and malware to gain higher privileges on the affected device. The bugs were discovered by SentinelOne and more...
November 16, 2021 Since October, more than 5,300 malicious shopping sites have appeared every week, where cyber criminals try to trick people into spending money on counterfeit or non-existent products via fake shopping sites. The report by the more...
November 16, 2021 In order to better protect themselves against possible ransomware attacks, organizations are making several changes to their cyber defenses. These changes include a shift to Software-as-a-Software, multi-factor authentication (82%), single sign-on (80%), identity access management more...
November 16, 2021 Reports from Trend Micro show that threat actors exploit vulnerabilities in Alibaba ECS instances to install Cryptominers malware. This is possible because all instances provide root access, allowing threat actors to gain access to the more...