@CitizenSec , 26-12-2024
On November 24, 2024, cybersecurity experts identified two malicious programs named Zebo-0.1.0 and Cometlogger-0.1. These programs were specifically designed to steal user data and take control of computers without permission.
What does Zebo-0.1.0 do?
This program records everything you type on your keyboard, such as passwords or messages. It also takes screenshots of your screen and sends this data to a server controlled by hackers. To remain on your computer, it creates special files that automatically launch every time the computer is turned on.
What does Cometlogger-0.1 do?
This program works similarly but also targets your accounts on popular platforms like Instagram, Twitter, and Discord. It records passwords, intercepts messages, and sends this information to hackers.
Both programs pose a serious threat to users as they can steal important information like passwords, bank details, and personal conversations.
These malicious programs were found in files intended for developers, but even if you're not a programmer, be cautious about what you download and install on your computer.
Современные дети растут в эпоху цифровых технологий — смартфоны, планшеты, социальные сети и онлайн-игры стали неотъемлемой частью их жизни. Интернет открывает массу возможностей для учёбы, творчества и общения, но вместе с этим приносит и серьёзные риски.
@citizensec
30-05-2025Правила использования корпоративной почты: что разрешено, что запрещено, меры безопасности и ответственность.
@CitizenSec
19-05-2025The special edition is dedicated to women in cybersecurity who overcome challenges, inspire others, and make the world safer. We share the stories of three professionals, their paths in cybersecurity, career advice, and tips on online security. Learn how to start your journey in cybersecurity and grow in this dynamic field.
@citizensec
03-05-2025Microsoft Warns: Chinese Spy Group Uses Everyday IT Tools to Hack Networks
@turin.medet
06-03-2025Thousands of Postman workspaces accidentally revealed sensitive data such as API keys and access tokens. Learn how to secure your API development environment and protect your organization's data.
@CitizenSec
21-11-2024SteelFox was first identified in August 2023, but its activity has increased markedly. More than 11,000 infection attempts have been recorded in recent months.
@CitizenSec
11-11-2024This problem allows hackers to gain unauthorized access to important Android system folders.
@CitizenSec
05-11-2024A Mozilla researcher has proposed a new way to bypass content filters in large language models (LM) used to prevent abuse.
@CitizenSec
01-11-2024Recently, cybersecurity researcher Alexander Hagen has developed a tool that can bypass a new security feature in Google Chrome called App-Bound Encryption.
@CitizenSec
30-10-2024