Criminals usually launch attacks after midnight, when companies have fewer IT workers.
The name "> <SCRIPT SRC = HTTPS: //MJT.XSS.HT> LTD" turned out to be dangerous for sites that could not properly process HTML.
Exploiting vulnerabilities in attacks is similar to the recently disclosed zero-day vulnerabilities in Windows and Chrome.
The service was actively advertised not only on the darknet, but also on the open Internet.
According to experts, the group acquired an exploit for the CVE-2020-14871 vulnerability on the black market.
Cisco has presented a report on the study of user privacy during the pandemic.
Neural networks will help users choose stronger passwords
The hacker group has donated part of the ransom it received from its victims to charities.
The DDoS attack power reached 2.54 TB / s - 0.24 TB / s more than the previous record.
The vulnerability could be exploited by sending an HTTP request using a custom protocol handler.
US Cyber Command strongly recommends that you install a patch for the Bad Neighbor vulnerability.
Vulnerabilities can be exploited to run arbitrary code or access confidential information.