Hacking

The President of European Central Bank Christine Lagarde targeted by hackersThe President of European Central Bank Christine Lagarde targeted by hackers

The President of European Central Bank Christine Lagarde targeted by hackers

Christine Lagarde, the president of the European Central Bank, was the target of a failed hacking attempt. The European Central…

3 years ago
Flaws in the ExpressLRS Protocol allow the takeover of dronesFlaws in the ExpressLRS Protocol allow the takeover of drones

Flaws in the ExpressLRS Protocol allow the takeover of drones

The protocol for radio-controlled (RC) drones, named ExpressLRS, is affected by vulnerabilities that can allow device takeover. Researchers warn of…

3 years ago
A fake job offer via LinkedIn allowed to steal $540M from Axie InfinityA fake job offer via LinkedIn allowed to steal $540M from Axie Infinity

A fake job offer via LinkedIn allowed to steal $540M from Axie Infinity

Threat actors used a fake job offer on LinkedIn to target an employee at Axie Infinity that resulted in the theft…

3 years ago
Anubis Networks is back with new C2 serverAnubis Networks is back with new C2 server

Anubis Networks is back with new C2 server

A large-scale phishing campaign leveraging the Anubis Network is targeting Brazil and Portugal since March 2022. A large-scale phishing campaign…

3 years ago
Experts demonstrate how to unlock several Honda models via Rolling-PWN attackExperts demonstrate how to unlock several Honda models via Rolling-PWN attack

Experts demonstrate how to unlock several Honda models via Rolling-PWN attack

Bad news for the owners of several Honda models, the Rolling-PWN Attack vulnerability can allow unlocking their vehicles. A team…

3 years ago
Apple Lockdown Mode will protect users against highly targeted cyberattacksApple Lockdown Mode will protect users against highly targeted cyberattacks

Apple Lockdown Mode will protect users against highly targeted cyberattacks

Apple plans to introduce a security feature, called Lockdown Mode, to protect its users against "highly targeted cyberattacks." The recent wave of…

3 years ago
Rozena backdoor delivered by exploiting the Follina bugRozena backdoor delivered by exploiting the Follina bug

Rozena backdoor delivered by exploiting the Follina bug

Threat actors are exploiting the disclosed Follina Windows vulnerability to distribute the Rozena backdoor. Fortinet FortiGuard Labs researchers observed a…

3 years ago
Ongoing Raspberry Robin campaign leverages compromised QNAP devicesOngoing Raspberry Robin campaign leverages compromised QNAP devices

Ongoing Raspberry Robin campaign leverages compromised QNAP devices

Cybereason researchers are warning of a wave of attacks spreading the wormable Windows malware Raspberry Robin. Raspberry Robin is a Windows…

3 years ago
Emsisoft: Victims of AstraLocker and Yashma ransomware can recover their files for freeEmsisoft: Victims of AstraLocker and Yashma ransomware can recover their files for free

Emsisoft: Victims of AstraLocker and Yashma ransomware can recover their files for free

Emsisoft has released a free decryption tool that allows victims of the AstraLocker and Yashma ransomware to recover their files…

3 years ago
Russian Cybercrime Trickbot Group is systematically attacking UkraineRussian Cybercrime Trickbot Group is systematically attacking Ukraine

Russian Cybercrime Trickbot Group is systematically attacking Ukraine

The operators behind the TrickBot malware are systematically targeting Ukraine since the beginning of the war in February 2022. IBM…

3 years ago