Warning, beware! DeerStealer infostyler is distributed under the guise of Google Authenticator.Google has fallen victim to its own advertising platform, Malwarebytes researchers say. The point is that attackers are creating ads…Aug 8, 2024Aug 8, 2024
Hamster Kombat.More than 200 million users tap hamster and are already planning to take a new Lamborghini Urus, an apartment in some new neighborhood in…Jul 14, 20243Jul 14, 20243
Exploits and vulnerabilities in the second quarter of 2024Statistics on registered vulnerabilities.May 25, 2024May 25, 2024
Google urgently calls for Chrome to be updated after zero-day vulnerability discovered.The vulnerability CVE-2024–4671 has been patched in the latest version.May 12, 2024May 12, 2024
Кибербезопасность 2024, девять основных тенденций.Аналитики делятся своими прогнозами. Готова ли ваша организация к угрозам, которые принесет наступающий год?Jan 26, 2024Jan 26, 2024
12 Cool Crypto Project Marketing Campaign Examples12 Cool Crypto Project Marketing Campaign ExamplesJan 24, 2024Jan 24, 2024
Bitcoin Ordinals under the hood. How Inscriptions and BRC20 workIntroduction.One of the most talked about narratives in recent weeks is tokens on the Bitcoin blockchain. It is so popular simply because it has already…Dec 25, 20232Dec 25, 20232
CISA warns of vulnerabilities and misconfigurations exploited in ransomware attacks.CISA warns organizations of vulnerabilities and misconfigurations that are known to be exploited in ransomware operations.Oct 14, 2023Oct 14, 2023
A NEW TOOL TO TRACK AND ANALYZE THE ACTIVITY OF RANSOMWARE GROUPS FROM OUR PARTNERS RANSOMLOOKER.Ransomlooker, a tool to monitor ransomware groups’ extortion sites and delivers consolidated feeds of their claims worldwide.Oct 14, 2023Oct 14, 2023
How cyber threat actors coordinate PSYOPS campaigns and kinetic warfare, cyber attacks…#OpIsrael, #FreePalestine And #OpSaudiArabia — How Cyber-Threat Actors Coordinate PSYOPS Campaigns With Kinetic Military ActionsOct 14, 2023Oct 14, 2023