Tag: hacker
-
North Korean Hackers Stole $1.34 Billion in Crypto in 2024
by
in SecurityNewsNorth Korean hackers stole $1.34 billion in cryptocurrency in 2024, more than half of the $2.2 billion stolen in all crypto hacks, and the attacks by threat groups linked to the rogue nation are becoming more frequent and are happening more quickly. First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/north-korean-hackers-stole-1-34-billion-in-crypto-in-2024/
-
Cybersecurity Snapshot: CISA Hands Down Cloud Security Directive, While Threat from North Korean IT Workers Gets the Spotlight
by
in SecurityNews
Tags: access, ai, authentication, best-practice, business, china, cisa, cisco, cloud, computer, control, cyber, cybersecurity, data, data-breach, email, extortion, finance, framework, fraud, google, government, guide, hacker, identity, incident, incident response, infrastructure, intelligence, international, Internet, jobs, korea, kubernetes, law, lessons-learned, linux, login, malicious, microsoft, mobile, monitoring, network, north-korea, office, password, regulation, risk, risk-management, russia, service, software, tactics, technology, threat, tool, updateCheck out the new cloud security requirements for federal agencies. Plus, beware of North Korean government operatives posing as remote IT pros. Also, learn how water plants can protect their HMIs against cyberattacks. And get the latest on the U.S. cyber incident response framework; the CIS Benchmarks; and local and state governments’ cyber challenges. Dive…
-
Ransomware bei einem Anbieter von Elektronik-Produkten in Deutschland
by
in SecurityNewsHacker machen Medion ein Weihnachtsgeschenk First seen on golem.de Jump to article: www.golem.de/news/cyberangriff-hacker-machen-medion-ein-weihnachtsgeschenk-2412-191850.html
-
20 Jahre Haft: Ransomware-Hacker muss Luxusresort auf Bali aufgeben
by
in SecurityNewsMit der Netwalker-Ransomware hat der Mann fast 1.600 Bitcoin eingenommen. Von dem Geld wollte er unter anderem ein Luxusresort auf Bali bauen. First seen on golem.de Jump to article: www.golem.de/news/verurteilt-ransomware-hacker-erhaelt-millionenstrafe-und-20-jahre-haft-2412-191902.html
-
Use Signal or other secure communications app
by
in SecurityNewsIn the wake of the widespread compromise of US telecom giants’ networks by Chinese hackers and the FBI advising Americans to use end-to-end encrypted communications, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/12/20/cisa-guide-secure-communications-mfa-iphone-android-signal/
-
Threat Actors Selling Nunu Stealer On Hacker Forums
A new malware variant calledNunu Stealeris making headlines after being advertised on underground hacker forums and Telegram channels. Priced at $100 per month, this malicious tool is gaining attention for its extensive capabilities and potential to wreak havoc on individuals and organizations alike. According to a post shared by a ThreatMon on X, the malware…
-
20 Jahre Haft: Ransomware-Hacker muss Luxusresort auf Bali abgeben
by
in SecurityNewsMit der Netwalker-Ransomware hat der Mann fast 1.600 Bitcoin eingenommen. Von dem Geld wollte er unter anderem ein Luxusresort auf Bali bauen. First seen on golem.de Jump to article: www.golem.de/news/verurteilt-ransomware-hacker-erhaelt-millionenstrafe-und-20-jahre-haft-2412-191902.html
-
Verurteilt: Ransomware-Hacker erhält Millionenstrafe und 20 Jahre Haft
by
in SecurityNewsMit der Netwalker-Ransomware soll der Mann fast 1.600 Bitcoin eingenommen haben. Auch die Coronapandemie hat er wohl gezielt ausgenutzt. First seen on golem.de Jump to article: www.golem.de/news/verurteilt-ransomware-hacker-erhaelt-millionenstrafe-und-20-jahre-haft-2412-191902.html
-
Die 10 besten APITools
by
in SecurityNews
Tags: ai, api, application-security, cloud, computing, credentials, cyberattack, data, ddos, docker, github, hacker, hacking, infrastructure, injection, mobile, open-source, programming, risk, service, software, sql, tool, vulnerability, wafMithilfe von APIs können verschiedene Software-Komponenten und -Ressourcen miteinander interagieren. Foto: eamesBot shutterstock.comAnwendungsprogrammierschnittstellen (Application Programming Interfaces, APIs) sind zu einem wichtigen Bestandteil von Netzwerken, Programmen, Anwendungen, Geräten und fast allen anderen Bereichen der Computerlandschaft geworden. Dies gilt insbesondere für das Cloud Computing und das Mobile Computing. Beides könnte in der derzeitigen Form nicht existieren, wenn…
-
Hacker sentenced to 69 months for stealing payment card info
by
in SecurityNews
Tags: hackerFirst seen on scworld.com Jump to article: www.scworld.com/news/hacker-sentenced-to-69-months-for-stealing-payment-card-info
-
AI-Powered Phishing: Defending Against the Next Generation of Cyber Threats
AI isn’t just transforming businesses, but also changing the way cyber criminals operate. One of those ways is more convincingAI-powered scams, whether delivered via: Phishing messages are becoming indistinguishable from the real thing. These types of attacks are also exploding in volume. This presents new challenges to organizations. How can they train their staff to…
-
Fortinet warns of FortiWLM bug giving hackers admin privileges
by
in SecurityNewsFortinet has disclosed a critical vulnerability in Fortinet Wireless Manager (FortiWLM) that allows remote attackers to take over devices by executing unauthorized code or commands through specially crafted web requests. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/fortinet-warns-of-critical-fortiwlm-bug-giving-hackers-admin-privileges/
-
BeyondTrust says hackers breached Remote Support SaaS instances
by
in SecurityNewsPrivileged access management company BeyondTrust suffered a cyberattack in early December after threat actors breached some of its Remote Support SaaS instances. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/beyondtrust-says-hackers-breached-remote-support-saas-instances/
-
Cryptocurrency hackers stole $2.2 billion from platforms in 2024
by
in SecurityNews$2.2 billion worth of cryptocurrency was stolen from various platforms in 2024, Chainalysis’ 2025 Crypto Crime Report has revealed. Of that sum, $1.34 billion was stolen … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/12/19/cryptocurrency-hackers-stole-2-2-billion-from-platforms-in-2024/
-
Sandworm-linked hackers target users of Ukraine’s military app in new spying campaign
Russian hackers are creating fraudulent websites that mimic the official page of Army+, a Ukrainian military app, with the goal of spreading malware for espionage.]]> First seen on therecord.media Jump to article: therecord.media/ukraine-military-app-espionage-russia-sandworm
-
North Korea-linked hackers accounted for 61% of all crypto stolen in 2024
by
in SecurityNewsAlongside the rising adoption and value of crypto assets, theft is also on the rise. This year, the total value of cryptocurrency stolen surged 21%, reaching a substantial $2.2 billion. And according to a Chainalysis report released on Thursday, more than half of this amount was stolen by North Korea-affiliated hacking groups. Earlier this year,…
-
CISA Mandates Federal Agencies Secure Their Cloud Environments
CISA is requiring all federal agencies to adopt stronger measures to improve their SaaS configurations and protect their complex cloud environments against growing threats from hackers, who are increasingly targeting third parties like cloud providers. First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/cisa-mandates-federal-agencies-secure-their-cloud-environments/
-
Crypto-Hackers Steal $2.2bn as North Koreans Dominate
by
in SecurityNewsMainly North Korean hackers stole over $2bn from crypto platforms in 2024, says Chainalysis First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/cryptohackers-steal-22bn-north/
-
Hackers Weaponizing LNK Files To Create Scheduled Task And Deliver Malware Payload
by
in SecurityNewsTA397, also known as Bitter, targeted a Turkish defense organization with a spearphishing email containing a RAR archive, which included a decoy PDF, a malicious LNK file disguised as a PDF, and an ADS file with PowerShell code. This technique, common for TA397, leverages NTFS ADS to establish persistence and deploy further malware like wmRAT…
-
Ukrainian hacker gets prison for infostealer operations
by
in SecurityNewsUkrainian national Mark Sokolovsky was sentenced to 60 months in federal prison for one count of conspiracy to commit computer intrusion. According to court documents, he … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/12/19/ukrainian-hacker-prison-infostealer-operations-raccoon-infostealer/
-
Iranian Hackers Launched A Massive Attack to Exploit Global ICS Infrastructure
by
in SecurityNewsIn a joint cybersecurity advisory, the FBI, CISA, NSA, and partner agencies from Canada, the United Kingdom, and Israel have issued an urgent warning about ongoing malicious cyber activities by advanced persistent threat (APT) actors affiliated with Iran’s Islamic Revolutionary Guard Corps (IRGC). The advisory provides critical new details on tactics, techniques, and procedures (TTPs)…
-
Das europäische Stromnetz hacken ist einfacher als ihr denkt
by
in SecurityNews
Tags: hackerSolarmodule als Einfallstor für Hacker: Kritische Infrastrukturen wie das europäische Stromnetz sind extrem anfällig für Solar-Hacks. First seen on tarnkappe.info Jump to article: tarnkappe.info/artikel/it-sicherheit/das-europaeische-stromnetz-hacken-ist-einfacher-als-ihr-denkt-306447.html
-
Cyberangriff: Hacker machen Medion ein Weihnachtsgeschenk
by
in SecurityNewsDie Angreifer wollen am 25. Dezember rund 1,5 TByte an Unternehmensdaten veröffentlichen. Medion spricht nach wie vor nur von einer IT-Störung. First seen on golem.de Jump to article: www.golem.de/news/cyberangriff-hacker-machen-medion-ein-weihnachtsgeschenk-2412-191850.html
-
Critical Flaws Expose 25,000 SonicWall Devices to Hackers
by
in SecurityNewsMany SonicWall Firewalls Are Unsupported or Lack Patches for Known Vulnerabilities. Thousands of SonicWall network security devices remain exposed with critical security flaws, including 20,000 running outdated firmware that no longer receives vendor support. Despite patches available for some of these flaws, many organizations continue to run the outdated firmware. First seen on govinfosecurity.com Jump…
-
Proposed UK White Hat Legal Shield Fails in House of Lords
Amendment to Computer Misuse Act Fails During Bloc Vote. A proposed amendment to British anti-hacking law that would have provided a legal shield to white hat hackers failed Wednesday in the House of Lords. Under the Computer Misuse Act, access to a computer system without adequate consent from the system owner is illegal. First seen…
-
Hacker könnten über Schwachstellen in Solaranlagen das europäische Stromnetz knacken
by
in SecurityNewsUnschöne, aber keineswegs neue Erkenntnis. Deutschland ist zwar “stolz” ob der installierten Leistung an Solarkollektoren. Aber ein griechischer White Hat-Hacker hat gezeigt, wie er sich mittels Notebook und Internet in zahlreiche europäischen Solaranlagen hacken und diese auch in Deutschland … First seen on borncity.com Jump to article: www.borncity.com/blog/2024/12/19/hacker-koennten-ueber-schwachstellen-in-solaranlagen-das-europaeische-stromnetz-knacken/
-
Russian hackers use RDP proxies to steal data in MiTM attacks
by
in SecurityNewsThe Russian hacking group tracked as APT29 (aka “Midnight Blizzard”) is using a network of 193 remote desktop protocol proxy servers to perform man-in-the-middle (MiTM) attacks to steal data and credentials and to install malicious payloads. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/russian-hackers-use-rdp-proxies-to-steal-data-in-mitm-attacks/
-
Vulnerabilities in Azure Data Factory Open Door to Attacks
by
in SecurityNewsAzure Data Factory’s Apache Airflow Integration Flaw Can Expose Cloud Environments. Security researchers say now-resolved vulnerabilities in a Microsoft Azure integration with the Apache Airflow workflow management platform showcase growing sophistication of attackers. Palo Alto Unit 42 researchers said the flaws could allow hackers to deploy malware and steal data. First seen on govinfosecurity.com Jump…
-
Hackers Exploiting Linux eBPF to Spread Malware in Ongoing Campaign
by
in SecurityNewsKEY SUMMARY POINTS Cybersecurity researchers Dr. Web have uncovered a new and active Linux malware campaign aimed at… First seen on hackread.com Jump to article: hackread.com/hackers-exploit-linux-ebpf-malware-ongoing-campaign/