CyberNews experts spoke about their recent experiment on the insecurity of IoT devices, during which researchers hacked 28000 printers. should be noted that many information security specialists have already condemned the...
Security
Gmail fixed a serious vulnerability that enables email-spoofing
Google developers have fixed a serious vulnerability in gmail that also affected G Suite. fact, the problem allowed an attacker to impersonate any Gmail and G Suite user and send emails on behalf of someone else, bypassing...
DDoS blackmailers pretend to be Fancy Bear and Armada Collective
Akamai experts have warned of a new wave of DDoS ransomware. Blackmailers threaten companies with DDoS attacks and pretend to be well-known hacker groups such as the Fancy Bear and the Armada Collective. to experts, ransomware...
Vulnerabilities in some email clients allowed attacks via mailto links
A group of experts from the Ruhr University in Bochum and the University of Applied Sciences of Münster published a report saying that vulnerabilities in some email clients allowed attacks through mailto links. turned out that...
TeamTNT miner steals credentials from Amazon Web Services
Trend Micro specialists discovered the TeamTNT miner this spring. Now there is evidence that TeamTNT steals credentials from Amazon Web Services. to researchers, this malware has been active since April 2020 and regularly scans...
Google Project Zero warns that Fresh Windows LSASS Patch is Ineffective
Google Project Zero writes that one of Microsoft’s patches, which was released earlier this week as part of the “update Tuesday”, namely the Windows LSASS (Local Security Authority Subsystem Service) patch...
An updated version of Agent Tesla steals passwords from browsers and VPN clients
SentinelOne experts warned that the updated version of Agent Tesla malware is equipped with modules for stealing credentials from applications, including browsers, FTP and email clients, as well as VPN solutions. main delivery...
Researcher Demonstrates Exploitation of Zoom Vulnerabilities at DEF CON
At DEF CON 28, which was held online this year, researcher Mazin Ahmed demonstrated a number of vulnerabilities affecting the popular video conferencing application Zoom. popularity has grown rapidly over the past year, from 10...