• Mon. Oct 16th, 2023

Security

All about cybersecurity, the largest hacks and ransomware sites. Guides, anonymous apps, and online security tips.

  • Home
  • New Sword2033 Backdoor Passes off Chinese Attacks as South African Military 

New Sword2033 Backdoor Passes off Chinese Attacks as South African Military 

Chinese attackers’ most recent online spying attempts target Linux using new malware versions. Researchers have identified “Sword2033” as a backdoor and a new PingPull ransomware version as tools used by…

The Hackers Stole $10 Million From Yearn

Yearn decentralized finance (DeFi) protocol has recently been targeted by attackers, resulting in a loss of more than $10 million in stablecoins. According to the experts from the cybersecurity company,…

What is Encryption? Top Encrypted Messengers – Part One

Most communication nowadays occurs online, which is why it’s important to use safe and trustworthy platforms. Below is a list of the most reliable encrypted messengers we’ve compiled. What is…

​​Top Encrypted Messengers, Part Two

Why are Encrypted Messengers important? When a user accesses the messenger that is not protected by an encryption protocol, they fully rely on the insecure connection hoping no one is…

5 Encryption Algorithms and Why You Need to Know Them

What is Data Encryption In today’s technological environment, it is crucial for individuals to safeguard their information against potential cyber attacks that could result in significant financial losses. This is…

Hackers Target Russia in New Infected Tor Browser Malware Campaign

Attackers have already stolen $400,000 in cryptocurrencies. Unknown hackers launched a malware campaign that targeted more than 15,000 users in 52 countries and resulted in the theft of over $400,000,…

FBI urged against using public charging stations

Using ports infected with malware can lead to device hacking and tracking The FBI is warning against using public charging stations due to the risk of device hacking and tracking.…

Crypto Businesses Are the Subject of a Complex 3CX Supply Chain Attack

The offensive who launched the chain attack on 3CX used a second-stage implant to strike only several cryptocurrency businesses. Seeing a rise in assaults in March 2023, which matched with…

Crypto Users from Portugal Are Victims of the New Harmful Program Called CryptoClippy

A new malware with the alias CryptoClippy is aimed at Portuguese users and is designed to steal cryptocurrencies as part of a phishing operation. Based on the Palo Alto Networks…

Iranian Hackers Caught Executing Dangerous Attacks While Posing as Ransomware

Iran’s MuddyWater state criminal gang has been observed carrying out destructive operations against hybrid environments while masking their activities as a ransomware campaign. Recent research from the Microsoft Security Intelligence…