-
Daily use of marijuana increases the risk of heart disease
A new study has found that daily cannabis use increases the risk of developing cardiovascular disease. The researchers analyzed data on how often 175,000 people used cannabis and the extent of their cardiovascular disease. They found a causal relationship between years of daily consumption and an increased risk of heart disease.“A growing body of evidence suggests that cannabis is not entirely harmless and may cause cardiovascular disease,” said study lead author Dr. Ishan Paranjpe, a medical resident at Stanford University.The study found that daily cannabis users were 34% more likely to develop coronary heart disease...
-
New LockBit ransomware targets macOS
MalwareHunterTeam cybersecurity researchers have discovered new LockBit ransomware specifically designed to attack Macs. This will be the first major ransomware campaign to target macOS.Experts found a ZIP archive on VirusTotal that appears to contain most of the new LockBit ransomware available.LockBit primarily uses encryptors designed to attack Windows, Linux, and VMware ESXi servers. However, the found archive also contained previously unknown ransomware for macOS, ARM, FreeBSD, MIPS, and SPARC processors.The archive contains a file named "locker_Apple_M1_64" which targets newer Macs running on the Apple Silicon processor. There are also encryptors for PowerPC processors that older...
-
Action1 RMM platform used to establish persistence and deploy ransomware
Security researchers warn that cybercriminals have increasingly used Action1 remote access software to persist on compromised networks and execute commands, scripts and binaries.Action1 is a remote monitoring and management (RMM) product that is commonly used by managed service providers (MSPs) and enterprises to remotely manage network endpoints, such as installing updates, software, and managing patches.According to The DFIR Report, the Action1 RMM platform is used by several threat actors to reconnoiter and execute code with system privileges on network hosts.Once the Action1 agent is installed, the attackers create a policy to automate the execution of...
-
A little-known iPhone tweak will allow thieves to permanently take over your account
It seems that Apple specialists wanted to do the best, but it turned out as always...The recent surge in iPhone thefts in the US and other countries has shown that Apple devices are highly vulnerable to hackers when used in public places. At the end of February, we already wrote that a simple passcode used to unlock an apple device is the most powerful tool that criminals can use to bypass all other security measures, one has only to take possession of the victim's smartphone.However, the scammers have gone further and learned how to use...
-
Hackers leak Microsoft Bing and Cortana source code online
Microsoft's digital signatures will allow cybercriminals to gain invulnerability to security measures.The Medusa ransomware gang has leaked the source code of Microsoft Bing, Bing Maps and Cortana online, and stated this on their website:“This leak is of more interest to programmers because it contains the source code for Bing, Bing Maps and Cortana products. There are many digital signatures of Microsoft products in the leak. Many of them have not been withdrawn. Go ahead and your software will have the same level of trust as the original Microsoft product,” the hackers wrote on their website.The...
-
Alpha-PVP addiction
When we talk about substances, the key factor for the researcher, in addition to the effect, is the harm of the drug itself. For example, people can use cocaine for a long time, killing their own mucous, nervous system and lifestyle. Addiction is also a factor of harm that interferes with a person’s normal life and daily activities. This leads to problems at work, in personal life and so on. So, for example, it is stupid to consider marijuana harmless: in case of addiction, it imposes problems on life.Alpha is an amazing drug in terms...
-
Mass distribution of the malicious tool "Legion"
A new Python-based hacking tool called "Legion" is being sold via Telegram to any willing cybercriminal to initially compromise target systems and gather credentials.Legion is a modular malware that, according to Cado Labs, is most likely based on the AndroxGhOst malware and contains modules for iterating over SMTP servers, remote code execution, using vulnerable versions of Apache, iterating cPanel and WebHost Manager accounts, interacting with Shodan API and abuse of AWS services.SentinelOne, in its analysis published late last month, suggested that AndroxGh0st is part of a complex toolkit called AlienFox, which is offered to attackers...
-
UK intelligence: more than 80 countries around the world use spyware against citizens
While some countries use the tools for their intended purpose, others use them to spy on journalists and dissidents.Over the past 10 years, more than 80 countries around the world have acquired spyware. This was stated by the UK National Computer Security Center (GCHQ), referring to UK intelligence data.The proliferation of commercial spying tools and services is increasingly lowering the barrier to entry into cyberspace for government and non-state cybercriminals, GCHQ said. The findings were based on a combination of "classified data, industry knowledge, academic material and open source information."While some countries have acquired hacking...
-
RTM Locker attacks from the shadows, avoiding large targets and hiding from law enforcement
Cybersecurity researchers at cybersecurity firm Trellix have detailed the tactics of a new emerging RTM Locker (“Read The Manual” Locker) group that is a ransomware-as-a-Service (RaaS) provider that attacks for profit.RTM Locker uses affiliates to collect ransom from victims, and all affiliates must abide by the group's strict rules. The group's business structure, in which affiliates must remain active and notify the gang of their departure, shows the group's organizational maturity, as has been seen in other groups such as Conti.The group's key feature is its ability to operate in the shadows, deliberately avoiding high-profile...
-
iPhone system calendar 'invites' users to install Israeli spyware
Citizen Lab researchers, together with Microsoft Threat Intelligence, have discovered commercial spyware created by the Israeli company QuaDream, which was used to compromise the iPhone using the ENDOFDAYS Zero-Click exploit. Microsoft dubbed the malware "KingsPawn".The attackers targeted a zero-day vulnerability affecting iPhones running iOS versions 14.4 through 14.4.2 using a technique described by Citizen Lab as "invisible iCloud calendar invitations." The “invisibility” of such invitations is that they are backdated and can be added to the iCloud calendar with absolutely no notice, but allow hackers to perform an exploit called “ENDOFDAYS” that leads to the...