New Telegram Scam Mimics Digital Wallets, Promotes Shady Apps

Scammers are increasingly using Telegram in their schemes, this time - to gather user information

A new Telegram scam has emerged, leveraging bots functionality of the application and offering fake earning schemes. Scammers impersonate official bots of popular digital wallet brands, tricking users into investing their money into non-existent ventures. Further, they simply cut any communications, leaving users with no money and no promised returns. Telegram Bots Mimic Digital Wallet… Continue reading New Telegram Scam Mimics Digital Wallets, Promotes Shady Apps

Jellyfish Loader Malware Discovered, Threatens 2024 Olympics

Analyzing the new threat Jellyfish Loader, that shares parts of its code with malware samples used in cyberattacks during 2018 Olympic Games

A new threat has been discovered in the form of a Windows shortcut that is actually a .NET-based shellcode downloader called Jellyfish Loader. It has some strange features that may signify that it is still at the development stage. Nonetheless, this malware is capable of deploying other malicious software in a selection of ways. Jellyfish… Continue reading Jellyfish Loader Malware Discovered, Threatens 2024 Olympics

Rite Aid Hacked, Data of 2.2 Million Customers Leaked

Another data breach at a health care organization

In June 2024, Rite Aid, a US-based chain of pharmacy stores, experienced a cyberattack. The attack affected the company’s information systems and resulted in the leakage of customer and employee data. Threat actor known as RansomHub claims the attack and shares some details regarding the information that they’ve managed to steal. Rite Aid Breach Exposes… Continue reading Rite Aid Hacked, Data of 2.2 Million Customers Leaked

15 Cybersecurity Myths and Denials

Cybersecurity Myths

There are many cybersecurity myths, just as in any industry that demands specialized knowledge. People often make reckless statements about viruses, anti-malware programs, and general cybersecurity practices. This leads to unbelievably silly—and potentially costly—situations. Now, we’re here to set the record straight. We’ll show you which beliefs are myths and which have some truth to… Continue reading 15 Cybersecurity Myths and Denials

Malware Protection

Malware Protection functions

Many people remain unaware of the substantial benefits of malware protection. While most have encountered the concept of computer threats, their understanding tends to be imprecise. In the past, the term “virus” frequently surfaced; now, “malware” has become the prevalent, albeit nebulous, term that casts a shadow of uncertainty over online threats. This vagueness partly… Continue reading Malware Protection

Common Types of Cyber Attacks

Cyber attack technologies have grown increasingly sophisticated, targeting any website where vulnerabilities are present. As a frequent internet user entering personal data, it’s crucial to understand the threats these intrusions pose. Personal data is highly valued by cybercriminals who misuse it for their purposes or even sell it on the dark web. Cybercrime operates like… Continue reading Common Types of Cyber Attacks

RegreSSHion OpenSSH Vulnerability Allows for RCE

Researchers has discovered a new “high” severity signal handler race condition vulnerability

A newly discovered vulnerability in OpenSSH nicknamed regreSSHion allows remote attackers to gain root privileges on Linux systems based on glibc library. This flaw enables an unauthenticated attacker to execute arbitrary code on the vulnerable system and obtain root privileges. Considering the wide application of OpenSSH, this flaw can have massive impact, comparable in size… Continue reading RegreSSHion OpenSSH Vulnerability Allows for RCE

Whaling Phishing

Whaling is a phishing that aims high-profile people in different companies and organizations.

Malicious actors know executives and high-level employees, such as public spokespersons, are familiar with common spam tactics. Due to their public profiles, they may have undergone extensive security awareness training, and the security team may have implemented stricter policies and more advanced tools to safeguard them. As a result, attackers targeting these individuals are forced… Continue reading Whaling Phishing

Hello Perv

A new Hello Perv email sextortion scam got its name for the introduction words

“Hello perv” is the name for an email scam that got its name from the eponymous title. It aims at scaring the user and asking them to pay the ransom in cryptocurrency, in exchange for not publishing explicit content. These emails are sent in thousands, targeting people all around the world, sometimes even misfiring by… Continue reading Hello Perv