Security
-
Hackers used old 0-day vulnerability in iOS since 2018. There is no patch yet
ZecOps specialists released a report in which they talked about the old 0-day vulnerability in iOS, which hackers have used…
Read More » -
Experts demonstrate exploit for SMBGhost RCE vulnerability
In March 2020, was published information about the problem CVE-2020-0796, which is also called SMBGhost. It affects SMBv3, and almost…
Read More » -
Attackers Hack Nintendo Accounts and Use Them to Buy Currency on Fortnite
This spring, Nintendo users massively reported that their accounts had been hacked and unidentified people log in from all over…
Read More » -
Governments of Australia, Taiwan and India banned using Zoom
We already have reported NASA, SpaceX and Google have warned their employees not to use Zoom. In addition, Taiwan authorities,…
Read More » -
RagnarLocker ransomware operators attacked Energias de Portugal energy holding and demand a ransom of 10 million euros
The Bleeping Computer magazine reported that at the beginning of this week, ransomware RagnarLocker attacked the Portuguese multinational company Energias…
Read More » -
Linksys resetting Smart Wi-Fi passwords due to DNS spoofing attacks
The Register writes that the Linksys developers are resetting the passwords from Linksys Smart Wi-Fi, because, apparently, this service was…
Read More » -
Microsoft fixed three 0-day vulnerabilities that were already under attack
In the framework of the April “Tuesday of updates”, Microsoft fixed 113 vulnerabilities in 11 Microsoft products, 17 of which…
Read More » -
Data from 500000 Zoom accounts are sold on hacker forums
Cybersecurity Cyble experts have reported that approximately 500000 Zoom accounts are sold on hacker forums and on the darknet, and…
Read More » -
Google forbade its employees to use Zoom
Due to the widespread self-isolation and quarantine, the Zoom video conferencing application has gained unprecedented popularity. However, along with popularity,…
Read More » -
Check Point: the coronavirus pandemic has created ideal conditions for cyberattacks
Check Point experts, together with Dimensional Research, interviewed IT and information security professionals from all over the world that work…
Read More »