News
-
Indie Developer Forced Valve to Remove Several Scam Steam Curators
Valve was forced to remove dozens of Steam Curators after indie developer Fabrice Breton of COWCAT Games discovered an apparent…
Read More » -
The organizers of the Pwn2Own hacker contest Will Offer Participants to Hack Remote Employees
Representatives of the Trend Micro Zero Day Initiative (ZDI) announced the main goals and prizes for the upcoming Pwn2Own hacker…
Read More » -
Google Launches Open Source Bug Bounty Program
This week, Google introduced a bug bounty for open source (a reward program for found vulnerabilities). This bug bounty is…
Read More » -
Google Will Stop VPN Apps from Blocking Ads
Starting November 2022, Google will prohibit VPN apps from the Google Play Store from blocking ads or interfering with ad…
Read More » -
Spyware Developers Ready to hack iOS and Android for 8 million euros
Documents from legal spyware company Intellexa (similar to NSO Group) have leaked online: according to these papers, the little-known company…
Read More » -
New Extortionist Group Donut Leaks Discovered
Researchers have described a new extortionist group, Donut Leaks (Don#t Leaks), which is somehow connected to the recent attacks on…
Read More » -
Encrypted ZIP Archives Have Two Different Passwords
Recently, information security specialist Arseniy Sharoglazov demonstrated on his Twitter that two passwords can be used for password-protected ZIP archives…
Read More » -
Ragnar Locker Attacks Greek Gas Company Desfa
The cyber gang behind the Ragnar Locker ransomware attacked the Greek state company Desfa, the exclusive operator of the Greek…
Read More » -
Researchers Found That the Media Industry Is Most Vulnerable to Cyberattacks
According to MDR provider BlueVoyant, the media industry is the most vulnerable to cyberattacks. Many media companies are extremely slow…
Read More » -
Fraudsters Learned to Steal Money from General Bytes Cryptocurrency ATMs
A 0-day vulnerability was found in General Bytes cryptocurrency ATMs, and the attackers immediately exploited it to steal money. When…
Read More »