A group of experts from the Ruhr University in Bochum and the University of Applied Sciences of Münster published a report saying that vulnerabilities in some email clients allowed attacks through mailto links. turned out that...
Author - Emma Davis
TeamTNT miner steals credentials from Amazon Web Services
Trend Micro specialists discovered the TeamTNT miner this spring. Now there is evidence that TeamTNT steals credentials from Amazon Web Services. to researchers, this malware has been active since April 2020 and regularly scans...
Information security specialists secretly vaccinated companies from Emotet
This spring, we talked in detail about the Cryptolaemus enthusiast group. It became known that specialists from Cryptolaemus for six months have been secretly vaccinating companies around the world from Emotet. includes more than...
Maze Operators Started Publishing Files Stolen From Canon
We recently reported that Canon was attacked by the Maze ransomware. The company was supposed to have paid the ransom, but Maze operators began posting files stolen from Canon. ransomware operators said last week that they...
Repair PAGE FAULT IN NONPAGED AREA Issue on Windows
PAGE FAULT IN NONPAGED AREA Issue Comes Up When Windows Cannot Locate Necessary Information AGE FAULT IN NONPAGED AREA (or PAGE_FAULT_IN_NONPAGED_AREA) stands for a stop alert that is followed by a blue screen of death (BSoD) on...
Google Project Zero warns that Fresh Windows LSASS Patch is Ineffective
Google Project Zero writes that one of Microsoft’s patches, which was released earlier this week as part of the “update Tuesday”, namely the Windows LSASS (Local Security Authority Subsystem Service) patch...
An updated version of Agent Tesla steals passwords from browsers and VPN clients
SentinelOne experts warned that the updated version of Agent Tesla malware is equipped with modules for stealing credentials from applications, including browsers, FTP and email clients, as well as VPN solutions. main delivery...
Researcher Demonstrates Exploitation of Zoom Vulnerabilities at DEF CON
At DEF CON 28, which was held online this year, researcher Mazin Ahmed demonstrated a number of vulnerabilities affecting the popular video conferencing application Zoom. popularity has grown rapidly over the past year, from 10...
Qualcomm Snapdragon vulnerabilities endanger nearly half of smartphones in the world
Researchers from Check Point have discovered more than 400 vulnerabilities in Qualcomm Snapdragon chips, which are installed on approximately 40% of smartphones in the world. Using these vulnerabilities, attackers can: turn your...
Firefox has fixed the “evil cursor” problem
Firefox developers have fixed an “evil cursor” problem exploited by fake tech support scammers. Due to this bug, attackers did not allow victims easily leave malicious sites. The vulnerability was fixed in Firefox 79...
