• View
Image

IT expert: How To Avoid being Tracked by Photos

The director of the company IT-Reserve Pavel Myasoedov spoke about how to protect yourself from surveillance using photographs. Standards that allow... Read more

Image

PlugwalkJoe Does the Perp Walk

Joseph “PlugwalkJoe” O’Connor, in a photo from a paid press release on Sept. 02, 2020, pitching him as a trustworthy cryptocurrency expert and advis... Read more

Image

Cloud-Delivered Malware Increased 68% in Q2, Netskope Reports

Cybersecurity firm Netskope published the fifth edition of its Cloud and Threat Report that covers the cloud data risks, menaces, and trends they see... Read more

Image

GitHub Brings Suite of Supply Chain Security Features to Go

GitHub has released a number of supply chain security updates for Go programming language modules. In a blog post published on July 22, GitHub staff... Read more

Image

Misconfigured Argo Workflows Instances Employed for Attacking Kubernetes Clusters

Intezer has discovered new Kubernetes cluster attack vectors using misconfigured instances of Argo Workflows. Threat actors have already been benefit... Read more

Image

1.2 Million Aussies Suffered when Uber was Breached in 2016

Uber infringed on the privacy of more than 1 million Australians in 2016, according to the Office of the Australian Information Commissioner (OAIC).... Read more

Image

Experts warned about the risk of hacking and obtaining a loan on the Public Services Portal of the Russian Federation

Experts warn that scammers have begun to hack the accounts of citizens on the site of state services and using them to take loans and microloans. "... Read more

Image

THORChain Suffers Another Major Hack Totaling $8M

Popular cross-chain liquidity exchange THORChain has been hit by another exploit, this time costing around $8 million, suffering a second security br... Read more

Image

Discord CDN and API Exploits Drive Wave of Malware Detections

As per the researchers, the number of reported Discord malware detections has increased significantly since last year. Even users who have never inte... Read more

Image

LemonDuck Targets Windows and Linux Systems

Initially, it was mainly a crypto-monetary botnet that allowed machine mining but later a transformation was initiated to make it a malware loader, b... Read more

Image

XCSSET, a MacOS malware, Targets Google Chrome and Telegram Software

As part of further "refinements in its tactics," a malware notorious for targeting the macOS operating system has been updated to add more e... Read more

Image

Wi-Fi Routers with Default Passwords are Vulnerable to Attacks

Cybersecurity researchers have advised the users to change the manufacturer’s default access credentials of their Wi-Fi home router to minimize the r... Read more

Image

Researchers Embedded Malware into an AI's 'Neurons' and it Worked Scarily Well

According to a new study, as neural networks become more popularly used, they may become the next frontier for malware operations.  The study publish... Read more

Image

Hacker Employ Milanote App for Spreading Phishing Email

The usage of collaborative applications had been a major victory with the pandemic. That incorporates Microsoft Teams, Google Meets, Zoom, and many o... Read more