Cybercriminals forced the Vatican to shut down its website

46 minutes ago · 0 comments
post-image

CISA Warns of Multiple Critical Vulnerabilities in Mitsubishi Electric GX Works3 Engineering Software

1 hour ago · 0 comments
post-image

Over 1600 Docker Hub images contain backdoors

5 hours ago · 0 comments
post-image
article-image46 minutes ago

Cybercriminals forced the Vatican to shut down its website

article-image1 hour ago

CISA Warns of Multiple Critical Vulnerabilities in Mitsubishi Electric GX Works3 Engineering Software

article-image5 hours ago

Over 1600 Docker Hub images contain backdoors

Blog Feed

Popular

Latest

Recent

    • Aurora malware is gaining popularity in the cybercriminal arena

      Aurora is an infostealer that first appeared on Russian-language hacker forums in April 2022. Initially, the developer advertised it as a botnet with powerful functionality that allowed hackers to steal information and gain remote access to the victim's systems. However, at the end of August 2022, researchers from SEKOIA noticed that Aurora was being advertised as an infostealer. This suggests one thing - the developer decided to abandon the creation of a multifunctional tool. But the malware still has plenty of special features:Polymorphic compilation;Data decryption on the server side;Ability to work with more than 40...

      post-image
    • How to reduce harm and negative consequences after using amphetamine

      Those of you who are familiar with amphetamines and phenethylamines are also familiar with depression, which can last up to several days. Phenethylamines reduce the amount of serotonin produced, which is the cause of depression. It is logical that the level of serotonin needs to be restored. This is why many people instinctively reach for chocolate after a trip. Chocolate contains the serotonin precursor L-tryptophan. But scientists have invented an even closer immediate precursor of serotonin, 5-HTP.100-300 mg of 5-HTP along with a multivitamin will fully restore lost serotonin after a phenethylamine trip. If you...

      post-image
    • How do drugs affect the brain?

      Although all drugs are different, they have one thing in common - in one way or another they cause a feeling of well-being in the brain. The part of the brain most affected by drugs is called the nucleus accumbens, which regulates the feeling of pleasure, motivating the person to do things that offer short- or long-term pleasure.In the brain of a person who uses a drug, the release of dopamine, which causes a natural feeling of well-being, is often already impaired, that is, the ability to feel pleasure without drugs is weakened. This is...

      post-image
    • ViperSoftX malware is back after two years of hibernation

      According to the latest reports from Avast, since the beginning of 2022, attacks using a malicious extension for the Google Chrome browser called "VenomSoftX", which steals the contents of the clipboard, have become more frequent. As the experts found out, this addon is part of the ViperSoftX JavaScript Trojan, which steals passwords and cryptocurrency.It is known that ViperSoftX has been quietly existing since 2020, because the Trojan was previously reported by researchers from Cerberus and Colin Cowie. In addition, a separate report from Fortinet was dedicated to him.And in a new report by Avast Threat...

      post-image
    • Cybercriminals forced the Vatican to shut down its website

      Experts suggest that Russian hackers are behind a series of cyberattacks on the website of the Holy See.According to a statement by Vatican spokesman Matteo Bruni, due to continuous cyber attacks, IT specialists had to temporarily disable the site and launch an investigation. The site was down on Wednesday and Thursday, but by Friday morning it was back up and running.It is not yet clear who is behind the cyberattack. However, experts recall incidents when cybercriminals attacked the Vatican because of the statements of Pope Francis. For example, earlier a Turkish hacker hacked into the...

      post-image
    • CISA Warns of Multiple Critical Vulnerabilities in Mitsubishi Electric GX Works3 Engineering Software

      Exploitation of these vulnerabilities could disrupt industrial processes.The US Cybersecurity and Infrastructure Protection Agency (CISA) this week issued an advisory warning of multiple vulnerabilities in Mitsubishi Electric GX Works3 engineering software."The successful exploitation of these vulnerabilities allows unauthorized attackers to view and execute programs, gain access to the MELSEC iQ-R/F/L series processor modules and the MELSEC iQ-R OPC UA series server module," the agency said.GX Works3 is Mitsubishi Electric's latest generation of programming and maintenance software specifically designed for MELSEC iQ-R series control systems. It includes many new features such as graphical system configuration, built-in...

      post-image
    • Over 1600 Docker Hub images contain backdoors

      More than 1,600 public Docker Hub images hide cryptocurrency miners, backdoors, DNS interceptors, and website redirectors.Docker Hub is a cloud-based container library that allows developers to search and download Docker images or upload their creations to a public library or personal repositories.Researchers at Sysdig have looked into the issue in an attempt to assess the extent of the problem and have reported images found that contain malicious code. Sysdig examined 250,000 unverified Linux images and identified 1,652 of them as malicious.In the first place are cryptominers, found in 608 images that used server resources for...

      post-image
    • Meta steals personal data even if you don't use social media

      Popular online tax filing platforms TaxAct, TaxSlayer, and H&R Block sent sensitive financial information to Meta via a tracking pixel.Researchers at The Verge found that a tracking pixel on organizations' websites violated Meta's privacy policy by sending the following information:Client's name;E-mail address;Income information;The amount of loans;The amount of the debt.Facebook may use information from tax websites to customize its advertising algorithms, even if the tax customer does not have a Facebook account.The experts also found that TaxAct was feeding similar information (without customer names) to Google through its analytics tool. A Google spokesperson said that...

      post-image
    • Cybercriminals forced the Vatican to shut down its website

      Experts suggest that Russian hackers are behind a series of cyberattacks on the website of the Holy See.According to a statement by Vatican spokesman Matteo Bruni, due to continuous cyber attacks, IT specialists had to temporarily disable the site and launch an investigation. The site was down on Wednesday and Thursday, but by Friday morning it was back up and running.It is not yet clear who is behind the cyberattack. However, experts recall incidents when cybercriminals attacked the Vatican because of the statements of Pope Francis. For example, earlier a Turkish hacker hacked into the...

      post-image
    • CISA Warns of Multiple Critical Vulnerabilities in Mitsubishi Electric GX Works3 Engineering Software

      Exploitation of these vulnerabilities could disrupt industrial processes.The US Cybersecurity and Infrastructure Protection Agency (CISA) this week issued an advisory warning of multiple vulnerabilities in Mitsubishi Electric GX Works3 engineering software."The successful exploitation of these vulnerabilities allows unauthorized attackers to view and execute programs, gain access to the MELSEC iQ-R/F/L series processor modules and the MELSEC iQ-R OPC UA series server module," the agency said.GX Works3 is Mitsubishi Electric's latest generation of programming and maintenance software specifically designed for MELSEC iQ-R series control systems. It includes many new features such as graphical system configuration, built-in...

      post-image
    • Over 1600 Docker Hub images contain backdoors

      More than 1,600 public Docker Hub images hide cryptocurrency miners, backdoors, DNS interceptors, and website redirectors.Docker Hub is a cloud-based container library that allows developers to search and download Docker images or upload their creations to a public library or personal repositories.Researchers at Sysdig have looked into the issue in an attempt to assess the extent of the problem and have reported images found that contain malicious code. Sysdig examined 250,000 unverified Linux images and identified 1,652 of them as malicious.In the first place are cryptominers, found in 608 images that used server resources for...

      post-image
    • Meta steals personal data even if you don't use social media

      Popular online tax filing platforms TaxAct, TaxSlayer, and H&R Block sent sensitive financial information to Meta via a tracking pixel.Researchers at The Verge found that a tracking pixel on organizations' websites violated Meta's privacy policy by sending the following information:Client's name;E-mail address;Income information;The amount of loans;The amount of the debt.Facebook may use information from tax websites to customize its advertising algorithms, even if the tax customer does not have a Facebook account.The experts also found that TaxAct was feeding similar information (without customer names) to Google through its analytics tool. A Google spokesperson said that...

      post-image
Read all posts

Monday, 05 December

Comments Feed