What happened? Reported, that data 89 Millions of Steam accounts were at risk due to the alleged leakage, associated with Twilio, service, which Steam uses to send SMS with 2FA codes. Flowing data, Including SMS logs, 2FA codes and metadata, Sold on dark Read More …
The distribution of malicious in Noodlophile under the guise of AI services video generation
Attackers began to use fake video generation tools using artificial intelligence, to spread a new type of malicious software - noodlophile, infostiler, disguised as the result of the work of "AI-services". Fraudulent sites use attractive names, such as Dream Machine, and are actively advertised through large Read More …
ATOMIC Stealer disguise for a hacked version of Evernote: Analysis MacOS attacks
Research Center Ahnlab Security Intelligence Center (Asec) revealed the distribution of the malicious program Atomic Stealer, disguised as the hacking version of Evernote. Atomic Stealer is an information, aimed at MacOS. He steals information from browsers, Key ligaments, cryptocurrencs and system data. Usually it spreads Read More …
Analysis of web browsers telemetry 2025

After the publication of the translation of the original article, prepared by the user SIZEOF, Colleagues asked to additionally test several browsers. The purpose of testing was to determine, What outgoing compounds are created after the installation of browsers and at their first launch. Refusal of liability data are provided as it is - without conclusions Read More …
cURL 27 years. The history of the creation and its author.

Today is performed 27 years since the creation of Curl – This is a command line based on the Libcurl library for transmitting data from the server and to the server using various protocols, Including http, HTTPS, FTP, FTPS, IMAP, IMAPS, Pop3, POP3S, Read More …
Secrets in “damaged” Winamp skins

A few years ago I collected materials for the Winamp Skin Museum, and some of the files seemed damaged to me. I decided to explore them, and it turned out, that in fact these skins are just zip files with a different extension. What will happen, if you extract these files? Read More …
The Rise and Fall of Yahoo! Messenger
Yahoo! Messenger was one of the first text messaging apps on the Internet. He made a real revolution in communication, offering users a convenient alternative to telephone conversations and email correspondence. Let's talk, how it appeared and why it could not compete with Read More …
RGB-TEAM “basin” data from PJSC Gazprom
An archive with data from PJSC Gazprom has appeared on the hacktivist website RGB-TEAM. The archive contains three files of ~12 MB: Monitor data relevance, at the moment it is not possible. Because. the archive appeared recently and there is practically no analysis data. The account still contains Read More …
RANSIM review

RanSim is a tool, which simulates ransomware attacks, to check, How your threat protection software responds to real attacks. You can use RanSim, To make sure, that your software blocks ransomware or can detect false positives . This tool simulates Read More …
How a hacker and an insider were caught at the World Bank
We continue surfing the web in search of cool cybersecurity stories. And today - an instructive story about, as Amelie Coran (Amelie Koran on her website) I caught a hacker with almost my bare hands, attacking World Bank server, as well as an insider, who tried to play on this story. Having neutralized Read More …