Home / Tech News

Tech News

Temporary patch for 0-day vulnerability in Internet Explorer arrived on the Internet

Patch for 0-day in Internet Explorer

Earlier this week, Microsoft announced about vulnerability in Internet Explorer, which is already exploited for “limited targeted attacks”. Now arrived temporary patch for this 0-day vulnerability in Internet Explorer. The problem received the identifier CVE-2020-0674 and it is associated with a vulnerability in the Firefox browser. Apparently, the mentioned “limited …

Read More »

Government hackers attacked companies more often in 2019

Government hackers attacked often

Organizations are more likely to become victims of state-sponsored cybercriminals. Government hackers in 2019 began to attack companies around the world more often. 25% of companies associate attacks on their business with cyber warfare or actions of other states, as showed results of a survey that conducted Radware specialists. In …

Read More »

Unknown hacker patches vulnerable Citrix servers

Hacker patches Citrix servers

Recently, in the public domain appeared exploits for the critical vulnerability CVE-2019-19781, earlier found in the Citrix Application Delivery Controller (NetScaler ADC) and Citrix Gateway (NetScaler Gateway). Now it was reported that an unknown hacker accesses vulnerable Citrix servers and patches them. Recall that according to experts, this problem threatens …

Read More »

Greta Thunberg became the most popular character in phishing campaigns

Greta Thunberg in phishing campaigns

Check Point analysts prepared a traditional monthly report on the most active threats, the Global Threat Index. Greta Thunberg and Christmas became the most popular topics in spamming and phishing campaigns. For already three months, the Emotet Trojan has occupied one of the leading positions among malware: in December, Emotet …

Read More »

Fancy Bear attacked Ukrainian oil and gas company Burisma

Fancy Bear attacked Burisma

The cybercriminal group Fancy Bear (also known as APT28) attacked Burisma. Hackers that are associated with Russian intelligence organized a phishing campaign aimed at employees of the Ukrainian oil and gas company Burisma Holdings. According to experts from the security company Area 1 Security, the criminals aimed at two subsidiaries …

Read More »

Cable Haunt Vulnerability Threats Millions of Modems with Broadcom Chips

Cable Haunt Threats Broadcom

Danish researchers have published a report on the Cable Haunt vulnerability that threats millions of cable modem with Broadcom chips. According to experts, the problem threatens more than 200 million cable modems only in Europe. Moreover, it is impossible to determine the exact number of vulnerable devices, because the vulnerability …

Read More »

Researcher remotely hacked iPhone using only one vulnerability

Researcher remotely hacked iPhone

Researcher in a few minutes remotely hacked iPhone using only Apple ID and exploiting only the CVE-2019-8641 vulnerability, due to which he gained access to the user’s accounts and passwords on the device and activated the camera. Vulnerabilities in software that could compromise a system without user intervention (for example, …

Read More »

Researchers hacked TikTok app via SMS

Researchers hacked TikTok app

Check Point experts found many issues in one of the world’s most popular applications, TikTok. Recently researchers hacked TikTok app using sms. TikTok is available in more than 150 markets, is used in 75 languages worldwide and has more than 1 billion users. In October 2019, TikTok was called one …

Read More »

US Homeland Security warns of possible cyberattacks by Iran

Homeland Security and Iran cyberattacks

Homeland Security USA issued a warning about possible acts of terrorism and cyberattacks by Iran in response to the assassination of General Kassem Suleimani, the head of the Quds special forces of the Islamic Revolutionary Guards Corps, after the US air strike on the Iraqi capital of Baghdad on January …

Read More »

Shitcoin Wallet for Google Chrome steals cryptocurrency passwords and keys

Shitcoin Wallet for Google Chrome

One of the extensions for Google Chrome, Shitcoin Wallet injects a special JavaScript code into web pages. Using this code, attackers steal passwords and private keys from cryptocurrency wallets and services. The first problematic addon appeared on December 9th. The extension received the identifier ckkgmccefffnbbalkmbbgebbojjogffn. Shitcoin Wallet developers claim that …

Read More »

Emotet topped the rating of the most common threats in 2019

Emotet topped the threat rating

Any.Run, an interactive service for automated malware analysis, has compiled a list of the 10 most common threats downloaded to this platform. The Trojan Emotet topped this 2019 threat rating. The top includes malware designed to steal all types of confidential information, bank details and remote access tools to control …

Read More »