“Gang-war” between groups of credit card fraudsters

Experts reported an active confrontation against fraudsters who were involved in the theft of payment information in online stores. One grouping tracks down the online skimmers of its competitors and interferes with their work, discrediting the collected data. The confrontation unfolded between hackers of trading platforms based on CMS Magento. These attacks, collectively called Magecart , have recently become a serious threat to […]

Continue Reading

TalkTalk Hackers jailed

The Central Criminal Court of England and Wales sentenced two cybercriminals who in 2015 attacked the British company TalkTalk. The organizer of the attack, 23-year-old Matthew Hanley (Matthew Hanley), received 12 months in prison, his accomplice, 21-year-old Connor Allsopp, will spend behind bars for 8 months. TalkTalk experts noticed problems in their infrastructure on October 21, 2015. On the […]

Continue Reading

Critical Vulnerabilties in TP-Link VPN routers have been patched

Researchers from Cisco Talos unveiled four vulnerabilities inherent in SOHO-routers TL-R600VPN production TP-Link. Updated firmware is already available, users are encouraged to install them as soon as possible. According to the experts, there are only two reasons for the problems: incorrect reorganization of the input data and errors in the parser code. A pair of vulnerabilities allows remote execution […]

Continue Reading

Emodia exploit crashes Skype for Business

SEC experts have uncovered the flaw in Microsoft’s corporate messenger, which can be used for DoS attacks. If you send a Skype message message to a Skype for Business user with several hundred emodzhi, the program starts to work more slowly, until it gives you a critical error. The vulnerability, which received the identifier CVE-2018-8546 , was closed as part […]

Continue Reading

Fake cryptocurrency wallets found on Google Play

ESET specialist Lukas Stefanko continues to find malware in the official Google Play directory. Let me remind you that Stefanko regularly detects threats in the official application catalog. For example, at the end of October of this year, an expert found 29 banking Trojans in Google Play at once  , and in September he obtained the removal of  six fake applications disguised […]

Continue Reading

Vulnerability in the plugin for WordPress allows running cryptominers on sites

In the popular AMP plugin for WordPress, a dangerous vulnerability has been fixed that allows users of WordPress sites with any privilege level to make changes that require administrative rights. According to researchers from WebARX Security, the plugin does not provide a mechanism for checking the privilege level of the current authorized user. As a result, access to […]

Continue Reading

Instagram Bug Reveals Some Passwords

Instagram social service operators fixed a software error that caused the user’s password to sometimes be displayed in plain text in the address bar of the browser. Affected users have already begun to notify by e-mail, strongly recommending that you change your password. A potentially dangerous bug was introduced with the launch of the Download Your Data option […]

Continue Reading

Advanced Mylobot Botnet Delivers Khalesi Trojan

Botnet Mylobot, who was on the radar information security experts in June 2018, establishes the victims of Trojan spy Khalesi. According to experts, the number of victims is approaching 20 thousand, under attack by users from 10 countries, including Russia. Advanced malware Mylobot uses several techniques at once to counteract protective systems. It can detect virtual environments, block Windows Defender and […]

Continue Reading

DarkGate malware attacks Western Europe

Experts of enSilo analyzed a modular Windows malware that could steal credentials, extract cryptocurrency, encrypt files, and open remote access to an infected machine. At the moment, the activity of DarkGate, as the author calls it, is limited to the territory of Western Europe and is particularly high in Spain and France. The first sample of DarkGate researchers […]

Continue Reading