Warning, beware! DeerStealer infostyler is distributed under the guise of Google Authenticator.Google has fallen victim to its own advertising platform, Malwarebytes researchers say. The point is that attackers are creating ads…Aug 8Aug 8
Hamster Kombat.More than 200 million users tap hamster and are already planning to take a new Lamborghini Urus, an apartment in some new neighborhood in…Jul 143Jul 143
Exploits and vulnerabilities in the second quarter of 2024Statistics on registered vulnerabilities.May 25May 25
Google urgently calls for Chrome to be updated after zero-day vulnerability discovered.The vulnerability CVE-2024–4671 has been patched in the latest version.May 12May 12
Кибербезопасность 2024, девять основных тенденций.Аналитики делятся своими прогнозами. Готова ли ваша организация к угрозам, которые принесет наступающий год?Jan 26Jan 26
12 Cool Crypto Project Marketing Campaign Examples12 Cool Crypto Project Marketing Campaign ExamplesJan 24Jan 24
Bitcoin Ordinals under the hood. How Inscriptions and BRC20 workIntroduction.One of the most talked about narratives in recent weeks is tokens on the Bitcoin blockchain. It is so popular simply because it has already…Dec 25, 20232Dec 25, 20232
CISA warns of vulnerabilities and misconfigurations exploited in ransomware attacks.CISA warns organizations of vulnerabilities and misconfigurations that are known to be exploited in ransomware operations.Oct 14, 2023Oct 14, 2023
A NEW TOOL TO TRACK AND ANALYZE THE ACTIVITY OF RANSOMWARE GROUPS FROM OUR PARTNERS RANSOMLOOKER.Ransomlooker, a tool to monitor ransomware groups’ extortion sites and delivers consolidated feeds of their claims worldwide.Oct 14, 2023Oct 14, 2023
How cyber threat actors coordinate PSYOPS campaigns and kinetic warfare, cyber attacks…#OpIsrael, #FreePalestine And #OpSaudiArabia — How Cyber-Threat Actors Coordinate PSYOPS Campaigns With Kinetic Military ActionsOct 14, 2023Oct 14, 2023