Thursday, April 9, 11:53
Labels Credentials

Tag: credentials

Hackers steal account credentials for known streaming services

Millions of people in the UK and around the world have switched to streaming services such as ...

APT28: Scans the Internet for vulnerable email servers for a year

According to security company Trend Micro, in recent years, one of Russia's leading state-owned hacking teams has been scanning ...

Mozilla Firefox Lockwise: Secured with Windows 10 credentials!

Mozilla is making changes to its Firefox Lockwise password manager. Firefox Lockwise syncs passwords from your browser to ...

TrickBot: Exploits infected PCs to launch RDP brute-force attacks

A new module for TrickBot banking Trojan was recently discovered that allows attackers to exploit compromised systems to launch brute-force attacks ...

49 million unique emails were exposed due to the misuse of credentials

An Israeli marketing company exposed 49 million unique emails after needless authentication commands for an Elasticsearch database, located in a ...

Microsoft Exchange Servers vulnerable to hackers!

Hackers are looking for Microsoft Exchange Servers that are vulnerable to the remote code error CVE-2020-0688, for which Microsoft released patches shortly ...

Chrome 80: Troubleshoots a stolen credentials store

The slight change in the Google Chrome 80 browser has had a devastating effect on one of the top cybercrime shopping outlets. According...

Phishing campaign targets banking users

Nowadays many people use banking applications on their mobile to conduct various transactions. The increased use of these applications did not stay ...

Parallax RAT: The dangerous trojan sold on hacking forums

According to security researcher MalwareHunterTeam, a Trojan that allows remote access called Parallax RAT is distributed through malicious spam campaigns. The installation...

Mobile Banking malware on the rise: How is WhatsApp related?

According to studies, malware attacks have increased by 50% in the last year. Usually, malware is used to steal money and ...

Most Read

Instructions for the face shields created by Apple

The pandemic of coronavirus has affected all areas of our daily lives and especially our work ....

Windows 10: WSL Linux integration test in File Explorer

Windows 10 improves integration between Windows Subsystem for Linux (WSL) and File Explorer, ...

XHelper malware: reinstalled after resetting to factory settings

The malware XHelper, which affects devices running the Android operating system, was first discovered ...

The Fall of the Zoom: Google forbids its employees to use it

A few weeks ago, Zoom was one of the top teleconferencing solutions. Many people working ...