Checklist: Essential Steps After Purchasing a Virtual Linux Server

Date: 02/08/2025

A virtual server is suitable for handling a wide range of tasks, especially since renting one is quite affordable. If you’re using a VDS, be sure to check out this small checklist to go through after purchasing a virtual server. Ignoring these simple rules can create a serious security vulnerability in your system. The article focuses on setting up a VDS using Ubuntu as an example, but the instructions should work for most modern distributions.
Read full article →


Microsoft: Secret Blizzard Attacks Russian Diplomatic Missions, Disguising as Kaspersky Products

📟 News

Date: 02/08/2025

Microsoft reported that the hacker group Secret Blizzard (also known as Turla, Waterbug, and Venomous Bear) is targeting staff at foreign embassies in Moscow. The report states that the hackers allegedly use a MitM (Man-in-the-Middle) position within internet service providers’ networks and disguise their malware, ApolloShadow, as Kaspersky Lab’s antivirus.

Read full article →


Hackers Embedded Raspberry Pi in Banking Network in Attempted Heist

📟 News

Date: 01/08/2025

Group-IB reported that the hacker group UNC2891 (also known as LightBasin) used a Raspberry Pi with 4G support to infiltrate a bank’s network and bypass its security systems. The single-board computer was connected to the same network switch as the ATM, creating a channel into the bank’s internal network. This allowed the attackers to perform lateral movement and install backdoors.

Read full article →