Microsoft in a statement denied rumors that hackers are using an exploit for the BlueKeep problem to distribute the DoppelPaymer ransomware, and also reported that attackers do not use Microsoft Teams to host encryptors in...
Author - Emma Davis
Monero cryptocurrency official website was hacked and distributed malware
The official Monero cryptocurrency website, GetMonero[.]Com, which provides binaries for Linux and Windows, has been hacked and distributed a malware that is able to steal user’s funds. The incident occurred on November 18, 2019...
Because of vulnerabilities in Android, malware can control the user’s camera
Checkmarx’s head of security research, Erez Yalon, has discovered a number of vulnerabilities in Google and Samsung’s mobile devices combined under the same identifier CVE-2019-2234. Due to these vulnerabilities in Android...
Adware malware masks itself as an ad blocker
Malwarebytes experts discovered an interesting malicious Android application. Malware masks itself as an ad blocker, but is actually intended to display unwanted ads to users. was called FakeAdsBlock and has already infected at...
Researchers Identified 37 Vulnerabilities in Popular VNC Implementations
IS xperts studied various implementations of the Virtual Network Computing (VNC) remote access system and found many problems. In total, IS experts identified 37 vulnerabilities in popular VNC implementations. Exploitation of...
Gap in the widespread Intel driver allows hackers to take complete control of the device
Eclypsium specialists warn of a vulnerability in the Intel driver, which is widely used in many systems. Using this gap, hackers can penetrate deep into the attacked device. August, Eclypsium researchers identified serious...
Some Intel processors are vulnerable to the new version of the Zombieload problem
The dangerous Intel: MDS processor problem called Zombieload has a different version and newer processor models are vulnerable to it. In May of year, researchers revealed information about a new class of vulnerabilities in...
QNAP Tells How To Deal With QSnatch
Recently, German and Finnish information security experts discovered a new malware infecting QNAP NAS devices. Now QNAP representatives tell how to deal with QSnatch. has already infected more than 7,000 devices only in Germany...
Amazon smart doorbells endanger Wi-Fi home networks and passwords
Bitdefender experts identified a dangerous problem in the Amazon Doorbell Ring Smart Doorbell Pro doorbells. Internet-connected calls could be used to intercept the owner’s Wi-Fi credentials. “Bitdefender researchers have...
Vulnerability in AsusWRT puts smart homes at risk of robbery
VpnMentor experts discovered a vulnerability in AsusWRT software that could allow attackers to gain access to the victim’s Wi-Fi network and connected to them smart devices, Amazon Alexa. Scammers could use this vulnerability to...
