Exploiting vulnerabilities in attacks is similar to the recently disclosed zero-day vulnerabilities in Windows and Chrome.
The service was actively advertised not only on the darknet, but also on the open Internet.
According to experts, the group acquired an exploit for the CVE-2020-14871 vulnerability on the black market.
Cisco has presented a report on the study of user privacy during the pandemic.
Neural networks will help users choose stronger passwords
The hacker group has donated part of the ransom it received from its victims to charities.
The DDoS attack power reached 2.54 TB / s - 0.24 TB / s more than the previous record.
The vulnerability could be exploited by sending an HTTP request using a custom protocol handler.
US Cyber Command strongly recommends that you install a patch for the Bad Neighbor vulnerability.
Vulnerabilities can be exploited to run arbitrary code or access confidential information.
The court upheld Microsoft's complaint about harm to its brands and allowed it to seize control of Trickbot's servers.
Experts provided a detailed description of all stages of the attack using the ransomware Ryuk.