Troy Hunt, creator and operator of the well-known leak aggregator Have I Been Pwned (HIBP), says that from now on, the FBI will directly upload compromised passwords to the service database, which already contains more than 613...
Author - Emma Davis
VMware Alerts That Critical Vulnerability Has Been Found In vCenter Server
VMware developers rushed to alert their customers that a critical vulnerability had been discovered in vCenter Server. also urge vCenter users to immediately update their software to the latest versions, where dangerous...
Underground marketplace Hydra makes $1.37 billion in cryptocurrency transactions
Cybersecurity companies Flashpoint and Chainalysis presented a joint report on the operation of the underground marketplace Hydra. 2015, immediately after the launch, Hydra was known as a drug trading platform, but over time, the...
Bose audio equipment company suffered ransomware attack
The well-known audio equipment company Bose said that it suffered from an attack of unknown ransomware that occurred back on March 7, 2021. The attack targeted the company’s systems in the United States, and although the...
Air India reports data leak of 4.5 million passengers
Indian airline Air India reported that one of its software vendors suffered from data leak, which led to the disclosure of personal information of 4.5 million passengers using the carrier’s services. leak was due to the...
Hackers threaten to sell Irish Health Service Executive files
Last week, Conti ransomware attacked the Health Service Executive (HSE) of Ireland, as well as the country’s Ministry of Health. If the Ministry of Health managed to abandon the attack in time, the HSE was less fortunate...
Microsoft warned of fake ransomware attacks – STRRAT Java Trojan
Microsoft has recorded a major campaign to distribute the STRRAT Java Trojan, which provides remote access (RAT) to its operators. This malware is known to steal data from victims, while simultaneously misleading it by simulating...
Colonial Pipeline experienced problems again, while experts asses the Darkside profits
On Tuesday, May 18, the computer systems of the American fuel giant Colonial Pipeline again experienced problems. In particular, the company’s customers could not access the system to place orders for fuel supplies through...
FragAttacks. How to keep your Wi-Fi network secure?
Fragmentation and aggregation attacks (FragAttacks) is a new shape of cyberattacks, related to the network vulnerabilities. This hazard may be present everywhere, even in-home networks, in contrast to public Wi-Fi threats. Let’s...
Nvidia halves mining performance of RTX 3080, 3070 and 3060 Ti
Nvidia announced that it halves the hashrate (performance) for mining Ethereum cryptocurrency on the new GeForce RTX 3080, 3070 and 3060 Ti graphics cards to reduce their attractiveness to miners. company promises to provide...
