Bleeping Computer reported on the ransomware NitroRansomware, which encrypts victims’ files, steals information from browsers, and then demands Discord Nitro gift codes to pay the ransom. Discord itself is free, users can...
Author - Emma Davis
Phishers still appreciate for Microsoft and DHL
Check Point compiled a report on the brands that are most frequently used in phishing attacks in Q1 2021 and found that phishers still appreciate Microsoft and DHL. Cybercriminals most often imitated these companies in order to...
Capcom was hacked through an old VPN device
In November 2020, it became known that the Japanese corporation Capcom was hacked through an old VPN device, and the attack affected the business operations of the game developer, including the operation of the email system...
Zerodium offers up to $300,000 for WordPress vulnerabilities
Prominent vulnerability broker Zerodium says it is temporarily tripling payouts for exploits for WordPress vulnerabilities that enable remote code execution on the latest versions of the CMS. company now assesses such...
Maze and Egregor ransomware operators earned more than $75 million in bitcoins
Analyst1 security researchers have calculated that the hackers behind the Maze and Egregor ransomware have already earned more than $75 million in ransoms from their victims. The company’s data is based on transactions that...
PHP Developers Warn About Potential Data Leak
PHP developers and maintainers are considering a version of a possible data leak, as a result of which the attackers placed a backdoor in the main repository. month, PHP developers and maintainers warned that unknown individuals...
Have I Been Pwned included a search for data leaked from Facebook by phone number
Last weekend, the data of 533 313 128 Facebook users were published on the darknet, and now Have I Been Pwned included a search for data leaked from Facebook by phone number. dump includes phone numbers, names, Facebook IDs...
VMware fixed vulnerabilities in Carbon Black Cloud Workload and vROps
VMware has patched several major vulnerabilities in the Carbon Black Cloud Workload and VMware vRealize Operations (vROps). vulnerability in Carbon Black Cloud Workload was identified as CVE-2021-21982 and scored 9.1 out of 10 on...
Miners abuse GitHub infrastructure
Dutch cyber security specialist Justin Perdok discovered that miners (at least one) can abuse the CI/CD function of GitHub Actions to force the company’s servers to mine cryptocurrency. It seems that such attacks do not...
How to Restore Windows 10. Does Resetting PC Remove Ransomware?
Are you concerned about ransomware on your PC? Wondering if resetting your computer can eliminate the threat? In this article, we’ll explore the effectiveness of resetting a PC to remove ransomware and guide you through the...
