Tag: hacker
-
SideCopy APT Hackers Impersonate Government Officials to Deploy Open-Source XenoRAT Tool
by
in SecurityNewsThe Pakistan-linked Advanced Persistent Threat (APT) group known as SideCopy has significantly expanded its targeting scope since late December 2024. Initially, the group focused on infiltrating India’s government, defense, maritime sectors, and university students. Recent developments indicate an inclusion of crucial sectors like railways, oil & gas, and external affairs ministries into their cyber activities.…
-
Russian APT Hackers Use Device Code Phishing Technique to Bypass MFA
by
in SecurityNews
Tags: apt, authentication, cyber, exploit, government, group, hacker, intelligence, mfa, microsoft, phishing, russia, threatRussian state-backed advanced persistent threat (APT) group Storm-2372 has exploited device code phishing to bypass multi-factor authentication (MFA) and infiltrate high-value targets across governments, NGOs, and critical industries. Since August 2024, this group has weaponized the OAuth device authorization flow”, a legitimate authentication mechanism”, to hijack user sessions and exfiltrate sensitive data. Microsoft Threat Intelligence…
-
Scattered Spider Launches Sophisticated Attacks to Steal Login Credentials and MFA Tokens
by
in SecurityNewsThe cyber threat landscape has witnessed remarkable adaptation from the notorious hacker collective known as Scattered Spider. Active since at least 2022, this group has been consistently refining its strategies for system compromise, data exfiltration, and identity theft. Silent Push analysts have tracked the evolution of Scattered Spider’s tactics, techniques, and procedures (TTPs) through early…
-
Critical FortiSwitch flaw lets hackers change admin passwords remotely
by
in SecurityNewsFortinet has released security patches for a critical vulnerability in its FortiSwitch devices that can be exploited to change administrator passwords remotely. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/critical-fortiswitch-flaw-lets-hackers-change-admin-passwords-remotely/
-
FBI untersucht vermeintliche Hacker-Angriffe der ISIS
by
in SecurityNewsÜber das Wochenende wurden einige, scheinbar nicht in Verbindung stehende Webseiten gehackt. Auf den betroffenen Seiten waren Meldungen zu sehen, in denen behauptet wurde, dass die Organisation Islamischer Staat (ISIS) für den Angriff verantwortlich sei. First seen on welivesecurity.com Jump to article: www.welivesecurity.com/deutsch/2015/03/09/fbi-untersucht-vermeintliche-hacker-angriffe-der-isis/
-
Die meistgesuchten Hacker der Welt
by
in SecurityNewsHacking ist heutzutage ein weltweites Phänomen, das jeden einschließen kann von den sogenannten Skriptkiddies über Netzaktivisten bis hin zu cyberkriminellen Organisationen und sogar Staaten. In diesem Artikel widmen wir uns den meistgesuchten Hackern weltweit, die sich noch immer auf der Flucht befinden. First seen on welivesecurity.com Jump to article: www.welivesecurity.com/deutsch/2015/05/20/die-meistgesuchten-hacker-der-welt/
-
LOT: Luftverkehr in Warschau durch Hacker lahmgelegt
by
in SecurityNewsAm gestrigen Sonntag hat ein Hackerangriff den Luftverkehr der polnischen Fluggesellschaft LOT am Flughafen in Warschau für mehrere Stunden lahmgelegt. Laut Reuters mussten hierdurch zehn nationale und internationale Flüge ganz gestrichen werden, zwölf konnten immerhin mit Verspätung starten. First seen on welivesecurity.com Jump to article: www.welivesecurity.com/deutsch/2015/06/22/lot-luftverkehr-warschau-durch-hacker-lahmgelegt/
-
Dino-Malware Analyse eines weiteren Spionage-Cartoons
by
in SecurityNewsNach Casper, Bunny und Babar haben wir einen weiteren Spionage-Cartoon entdeckt, der von seinen Entwicklern Dino genannt wird. Hierbei handelt es sich um einen ausgeklügelten Backdoor-Trojaner, der vermutlich von der bereits bekannten Hacker-Gruppe ‘Animal Farm” entwickelt wurde, die auch hinter den anderen Spionage-Cartoons stecken. First seen on welivesecurity.com Jump to article: www.welivesecurity.com/deutsch/2015/06/30/dino-malware-analyse-eines-weiteren-spionage-cartoons/
-
Germany links cyberattack on research group to Russian state-backed hackers
by
in SecurityNewsThe German Association for Eastern European Studies (DGO) said the attack at the end of March targeted email systems, bypassing security measures put in place after another recent breach with suspected Russian links. First seen on therecord.media Jump to article: therecord.media/germany-links-cyberattack-russian-hackers
-
NCSC shares technical details of spyware targeting Uyghur, Tibetan and Taiwanese groups
by
in SecurityNewsThe U.K.’s National Cyber Security Centre and international cybersecurity and intelligence agencies on Wednesday said hackers are deploying two forms of previously identified spyware to snoop on Uyghur, Tibetan and Taiwanese individuals and civil society organizations. First seen on therecord.media Jump to article: therecord.media/ncsc-shares-details-on-spyware-targeting-uyghur-tiben-taiwanese-groups
-
CentreStack RCE exploited as zero-day to breach file sharing servers
by
in SecurityNewsHackers exploited a vulnerability in Gladinet CentreStack’s secure file-sharing software as a zero-day since March to breach storage servers First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/centrestack-rce-exploited-as-zero-day-to-breach-file-sharing-servers/
-
IT-Sicherheit 2015: Wie Firmen unnötige Kosten vermeiden
by
in SecurityNewsWie ein kürzlich veröffentlichter Bericht von Piper Jaffray zeigt, planen 75 Prozent der Unternehmen für das Jahr 2015 eine Steigerung der Ausgaben für IT-Sicherheit. Vor dem Hintergrund, dass ein Jahr voller professioneller Hacker-Angriffe und Datenlücken hinter uns liegt, ist das nicht unbedingt verwunderlich. First seen on welivesecurity.com Jump to article: www.welivesecurity.com/deutsch/2015/01/22/it-sicherheit-2015-unnoetige-kosten-vermeiden/
-
Katayamas Katze Der japanische Hacker und seine Rätsel
by
in SecurityNewsHaltet euch fest, denn heute geht es um eine der verrücktesten und bizarrsten Hacker-Geschichten, die ich jemals gehört habe zumindest außerhalb der Kinosäle. Im Jahr 2012 übte ein Blackhat-Hacker eine Menge Druck auf die japanische Polizei aus, indem er Mordabsichten und andere Androhungen bekundete. First seen on welivesecurity.com Jump to article: www.welivesecurity.com/deutsch/2015/02/05/katayamas-katze-der-japanische-hacker-und-seine-ratsel/
-
Infografik: Alternativen zu Passwörtern
by
in SecurityNewsDas Passwort ist ein stetiger Begleiter in unserem Computer-Alltag. Ob bei der Anmeldung zu unserem Benutzerkonto auf dem PC, beim Onlinebanking oder im Unternehmen überall erhalten wir den Zugang über ein Passwort. Doch seit einigen Jahren gerät diese Authentifizierungsmethode mehr und mehr in Verruf, ein Einfallstor für böswillige Hacker zu sein. First seen on welivesecurity.com…
-
Hackers Claim Magento Breach via Third-Party, Leak CRM Data of 700K Users
by
in SecurityNewsAnother day, another data breach claim involving a high-profile company! First seen on hackread.com Jump to article: hackread.com/hackers-magento-breach-3rd-party-crm-data-leak/
-
Treasury’s OCC Says Hackers Had Access to 150,000 Emails
by
in SecurityNewsThe Office of the Comptroller of the Currency (OCC) has disclosed an email security incident in which 100 accounts were compromised for over a year. The post Treasury’s OCC Says Hackers Had Access to 150,000 Emails appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/treasurys-occ-says-hackers-had-access-to-150000-emails/
-
Hackers Stole ‘Highly Sensitive’ US Banking Regulator Emails
Microsoft Reportedly Alerted Office of the Comptroller of the Currency to Breach. For nearly two years, hackers reportedly spied on 150,000 highly sensitive emails sent and received by America’s banking regulator, the Office of the Comptroller of the Currency. The OCC said it’s continuing to probe the major information security incident. First seen on govinfosecurity.com…
-
Taylor Swift lacht über Hacker-Angriff
by
in SecurityNewsDie Twitter- und Instagram-Accounts von Taylor Swift wurden gehackt, doch die Sängerin nimmt es gelassen und lacht über die Drohung der Angreifer, Nacktbilder von ihr zu veröffentlichen. First seen on welivesecurity.com Jump to article: www.welivesecurity.com/deutsch/2015/01/28/taylor-swift-lacht-uber-hacker-angriff/
-
Zero-day bug used in ransomware attacks on US real estate firms
by
in SecurityNewsMicrosoft published a blog post on Tuesday about the bug alongside its larger Patch Tuesday release, detailing how hackers exploited the vulnerability and used a strain of malware called PipeMagic before deploying ransomware on victims. First seen on therecord.media Jump to article: therecord.media/microsoft-zero-day-used-ransomware-attack-real-estate
-
Hackers Conceal NFC Carders Behind Apple Pay and Google Wallet
by
in SecurityNews
Tags: apple, cyber, cybercrime, exploit, finance, fraud, google, hacker, mobile, nfc, password, technology, vulnerabilityIn a disturbing evolution of financial fraud, cybercriminals are leveraging advanced techniques to exploit mobile payment systems such as Apple Pay and Google Wallet. Once reliant on magnetic stripe card cloning, fraudsters have adapted to breakthroughs in card security technology like chip cards and one-time passwords, exploiting vulnerabilities in contactless payments and digital wallets. By…
-
WhatsApp for Windows Flaw Could Let Hackers Sneak In Malicious Files
If you use WhatsApp Desktop on Windows, listen up! A flaw in WhatsApp for Windows (CVE-2025-30401) let attackers disguise malicious files as safe ones. Update to version 2.2450.6 or later to stay secure. First seen on hackread.com Jump to article: hackread.com/whatsapp-windows-flaw-hackers-sneak-malicious-files/
-
Hackers lurked in Treasury OCC’s systems since June 2023 breach
by
in SecurityNewsUnknown attackers who breached the Treasury’s Office of the Comptroller of the Currency (OCC) in June 2023 gained access to over 150,000 emails. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/hackers-lurked-in-treasury-occs-systems-since-june-2023-breach/
-
How AI Agents can help AppSec teams keep up with AI-generated code vulnerabilities
by
in SecurityNewsWhile AppSec teams are stuck with legacy scanners and backlogs, developers and hackers have adopted AI tools to accelerate their respective objectives. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/spons/how-ai-agents-can-help-appsec-teams-keep-up-with-ai-generated-code-vulnerab/744757/
-
Ransomware-Attacke auf Europcar
by
in SecurityNews
Tags: access, android, backup, cloud, computer, cyberattack, dark-web, gitlab, hacker, infrastructure, mail, ransomwareEuropcar hat einen Cyberangriff mit Datendiebstahl erlitten.Im Darknet sind kürzlich Hinweise auf einen Cyberangriff bei Europcar aufgetaucht, bei dem Kundendaten und andere vertrauliche Informationen entwendet wurden. Wie aus einem Bericht von Bleeping Computer hervorgeht, ist der Angreifer in die Gitlab-Repositories des Fahrzeugvermieters eingedrungen und hat Daten von 200.000 Kunden und den Quellcode für Android- und…
-
Over 26,000 Dark Web Discussions Focused on Hacking Financial Organizations
by
in SecurityNews
Tags: cyber, cyberattack, cybercrime, cybersecurity, dark-web, finance, hacker, hacking, service, strategy, threat, tool, vulnerabilityRadware’s comprehensive research into the cybersecurity landscape has uncovered significant trends shaping the financial services industry’s vulnerabilities in 2024. The analysis, conducted across 46 deep-web hacker forums, identified over 26,000 threat actors’ discussions that revealed increasingly sophisticated cyberattack methods. The study highlights the adoption of advanced tools and strategies by cybercriminals, underscoring the urgent need…
-
Oracle Confirms Breach: Hackers Stole Client Login Credentials
by
in SecurityNewsOracle Corporation has officially confirmed a cybersecurity breach in which hackers infiltrated its systems and stole client login credentials. This marks the second security incident disclosed by the software giant in less than a month, raising alarm among customers and cybersecurity professionals worldwide. According to sources familiar with the matter, Oracle informed certain clients earlier…
-
The Silent Threat in CI/CD: How Hackers Target Your Automation?
by
in SecurityNewsLet’s enter the world of software development! Automation has now become the heartbeat of contemporary DevOps practices. However, on the backdrop, the threat associated with it has been growing at a similar rate. Tools like GitHub Actions are known to streamline workflows by automating the testing process, deployment, and integration tasks. As the world talked……
-
The Web application Penetration Testing Tools That Actually Works
by
in SecurityNewsIf your website handles any kind of user data, chances are it’s being watched. And not just by customers. Hackers, too. That’s why web application penetration testing tools is no… First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/04/the-web-application-penetration-testing-tools-that-actually-works/