Researchers have noticed that already two hacker groups have begun to use a new tactic to force their victims to pay a ransom: hackers have added search functionality to their sites. might also be interested to know what More...
Author - Emma Davis
Hackers Are Switching from Cobalt Strike to Brute Ratel C4
Experts warn that hackers are moving from using the well-known Cobalt Strike to the less popular red team tool, the Brute Ratel Command and Control Center (Brute Ratel C4 or BRc4). , Palo Alto Unit 42 analysts found that the BRc4...
Microsoft Changed Its Mind about Banning Macros in Office
In the spring of this year, Microsoft announced that it intends to block VBA macros in downloaded Office documents by default, as this functionality is used by attackers to spread malware. , the company said that after receiving...
Microsoft Silently Fixes ShadowCoerce Bug
Microsoft announced that as part of the June “Tuesday updates” it fixed the previously disclosed ShadowCoerce vulnerability, which allowed hackers to attack Windows servers using NTLM relay attacks (relay attack)...
How to Find Stalkerware on Your Smartphone?
You can determine the presence of Stalkerware (a type of commercial software used for spying) on an Android smartphone. To detect such an application on Android, you need to check the permissions of the applications: usually...
Cryptocurrency Scam Ads Appear on British Army Twitter and YouTube
The British Army’s Twitter and YouTube accounts were hacked and used for some time to promote a cryptocurrency scam. verified Twitter account advertised fake NFTs and cryptocurrency giveaways. On YouTube, the channel was...
Attackers Hack into Accounts Posing as Verified Twitter Accounts
An attacker hacks into verified Twitter accounts to send fake suspension messages to other users. me remind you that we wrote that Researcher finds that Twitter images can hide up to 3MB of data. On July 1, BleepingComputer...
Jenkins Developers Warn That 29 Plugins Contain 0-Day Vulnerabilities
The Jenkins security team announced the discovery of 34 vulnerabilities affecting 29 popular plugins. Worse, 29 of the problems found are 0-day vulnerabilities, so these are very fresh bugs, for which there is still no patches...
Google Blocked Dozens of Domains Owned by Hacker Mercenaries
The Google Threat Analysis Group (TAG) has blocked dozens of malicious domains and websites that were used by hired hackers to attack around the world. me remind you that we also reported that Microsoft Stops Seventeen Domains...
RansomHouse Hackers Claim to Have Stolen 450 GB of Data from AMD
AMD has said it is investigating a possible cyberattack, as the RansomHouse hack group recently claimed to have stolen more than 450GB of data from the manufacturer last year. me remind you that we also wrote that New Hertzbleed...