Tag: hacking
-
BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability
by
in SecurityNews
Tags: crime, data, data-breach, exploit, group, hacker, hacking, infrastructure, leak, ransomware, threat, vulnerabilityIn what’s an instance of hacking the hackers, threat hunters have managed to infiltrate the online infrastructure associated with a ransomware group called BlackLock, uncovering crucial information about their modus operandi in the process. Resecurity said it identified a security vulnerability in the data leak site (DLS) operated by the e-crime group that made it…
-
Chinese cybersecurity group linked to global hacking campaign
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/brief/chinese-cybersecurity-group-linked-to-global-hacking-campaign
-
RFID Hacking: Exploring Vulnerabilities, Testing Methods, and Protection Strategies
by
in SecurityNewsRadio-Frequency Identification (RFID) technology is everywhere”, powering everything from contactless payments and inventory tracking to access control systems. But while RFID systems makes life more convenient, it also introduces serious security… First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/rfid-hacking-exploring-vulnerabilities-testing-methods-and-protection-strategies/
-
StreamElements discloses third-party data breach after hacker leaks data
by
in SecurityNewsCloud-based streaming company StreamElements confirms it suffered a data breach at a third-party service provider after a threat actor leaked samples of stolen data on a hacking forum. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/streamelements-discloses-third-party-data-breach-after-hacker-leaks-data/
-
New SparrowDoor Backdoor Variants Found in Attacks on U.S. and Mexican Organizations
The Chinese threat actor known as FamousSparrow has been linked to a cyber attack targeting a trade group in the United States and a research institute in Mexico to deliver its flagship backdoor SparrowDoor and ShadowPad.The activity, observed in July 2024, marks the first time the hacking crew has deployed ShadowPad, a malware widely shared…
-
RedCurl Shifts from Espionage to Ransomware with First-Ever QWCrypt Deployment
by
in SecurityNewsThe Russian-speaking hacking group called RedCurl has been linked to a ransomware campaign for the first time, marking a departure in the threat actor’s tradecraft.The activity, observed by Romanian cybersecurity company Bitdefender, involves the deployment of a never-before-seen ransomware strain dubbed QWCrypt.RedCurl, also called Earth Kapre and Red Wolf, has a history of orchestrating First…
-
Vulnerabilities Allow Remote Hacking of Inaba Plant Monitoring Cameras
by
in SecurityNewsProduction line monitoring cameras made by Inaba can be hacked for surveillance and sabotage, but they remain unpatched. The post Vulnerabilities Allow Remote Hacking of Inaba Plant Monitoring Cameras appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/vulnerabilities-allow-remote-hacking-of-inaba-plant-monitoring-cameras/
-
Mercenary Hacking Group Appears to Embrace Ransomware
by
in SecurityNewsHighly Targeted Ransomware Hit Traced to Long-Running Cyberespionage Group. A stealthy group of mercenary hackers active since 2018 appears to have diversified into hitting hypervisors with ransomware via highly targeted attacks. Researchers said they tracked the hit to a corporate espionage team tracked as RedCurl. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/mercenary-hacking-group-appears-to-embrace-ransomware-a-27834
-
Getting the Most Value Out of the OSCP: The PEN-200 Labs
by
in SecurityNews
Tags: access, ai, attack, compliance, container, cyber, cybersecurity, dns, docker, exploit, firewall, guide, hacking, Hardware, infrastructure, intelligence, jobs, kubernetes, microsoft, mitigation, network, open-source, oracle, penetration-testing, powershell, risk, security-incident, service, siem, skills, technology, tool, training, vmware, vulnerability, windowsHow to leverage the PEN-200 simulated black-box penetration testing scenarios for maximal self-improvement and career success. Disclaimer: All opinions expressed in this article are solely my own. I have reviewed the content to ensure compliance with OffSec’s copyright policies and agreements. I have not been sponsored or incentivized in any way to recommend or oppose any…
-
Lengthy disruption of Russian internet provider claimed by Ukrainian hacker group
A multi-day outage of internet services by Lovit, a widely used provider in cities such as Moscow and St. Petersburg, was claimed by the IT Army, a pro-Ukraine hacking group. First seen on therecord.media Jump to article: therecord.media/russia-isp-lovit-outages-claimed-ukraine-it-army
-
IngressNightmare Flaws Expose Kubernetes Clusters to Remote Hacking
by
in SecurityNewsCritical remote code execution vulnerabilities found by Wiz researchers in Ingress NGINX Controller for Kubernetes. The post IngressNightmare Flaws Expose Kubernetes Clusters to Remote Hacking appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/ingressnightmare-flaws-expose-many-kubernetes-clusters-to-remote-hacking/
-
New Specter Insight C2 Tool Fuels ClickFix-Based Hacking Campaigns
by
in SecurityNewsA recent cybersecurity investigation has uncovered a previously unidentified Command and Control (C2) framework, dubbedSpecter Insight C2. This discovery was made by a team of researchers who have been analyzing recent hacking campaigns, including those utilizingClickFixtactics, as per a report shared by DFIR in X. The emergence of this new tool suggests an evolution in…
-
Tech specialist files legal claim after being refused security clearance for MI6 role
by
in SecurityNews
Tags: hackingAn IT specialist has asked the Investigatory Powers Tribunal to investigate a series of hacking incidents after disclosing their social media accounts to MI6 vetting staff First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366620867/Tech-specialist-files-legal-claim-after-being-refused-security-clearance-for-MI6-role
-
IngressNightmare Flaws Expose Many Kubernetes Clusters to Remote Hacking
by
in SecurityNewsCritical remote code execution vulnerabilities found by Wiz researchers in Ingress NGINX Controller for Kubernetes. The post IngressNightmare Flaws Expose Many Kubernetes Clusters to Remote Hacking appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/ingressnightmare-flaws-expose-many-kubernetes-clusters-to-remote-hacking/
-
Wheelchair Firm Ramps Up Notices to 500,000 for Email Hack
by
in SecurityNewsLarge Health Data Breach Started With Phishing Lure in Employees’ Email. Tennessee-based Numotion, one of the largest U.S. providers of wheelchairs and other health-related mobility products is notifying nearly 500,000 people of a 2024 email hacking incident that potentially compromised their personal and health-related information. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/wheelchair-firm-ramps-up-notices-to-500000-for-email-hack-a-27814
-
Encrypted Messaging Apps Promise Privacy. Government Transparency Is Often the Price
by
in SecurityNewsPublic officials and private citizens are consistently warned about hacking and data leaks, but technologies designed to increase privacy often decrease government transparency. The post Encrypted Messaging Apps Promise Privacy. Government Transparency Is Often the Price appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/encrypted-messaging-apps-promise-privacy-government-transparency-is-often-the-price/
-
North Korea Launches Military Research Facility to Strengthen Cyber Warfare Operations
by
in SecurityNewsNorth Korea has taken a significant step in enhancing its cyber warfare capabilities by establishing a new research center, known as Research Center 227, under the military’s Reconnaissance General Bureau (RGB). This move is part of a broader strategy to bolster the country’s offensive cyber operations, particularly focusing on AI-powered hacking technologies. Background and Objectives…
-
North Korea launches hacking hub focused on artificial intelligence
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/news/north-korea-launches-hacking-hub-focused-on-artificial-intelligence
-
Chinese Hackers Exploit Unpatched Servers in Taiwan
by
in SecurityNewsUAT-5918 Breaches Taiwan’s Critical Sectors Using N-Day Flaws for Cyberespionage. Hackers with ties to China-based hacking groups including Volt Typhoon are breaching Taiwan’s critical infrastructure by exploiting unpatched web and application servers as entry points for a cyberespionage campaign. Cisco Talos threat hunters identified the new threat actor as UAT-5918. First seen on govinfosecurity.com Jump…
-
Ex-Michigan, Ravens Football Coach Charged with Hacking Athlete Accounts
by
in SecurityNewsMatthew Weiss, former football coach for the University of Michigan and the Baltimore Ravens, for almost 10 years accessed the social media and other online accounts of thousands of student athletes and downloaded personal information and intimate images, said prosecutors who indicted for illegal computer access and identity theft. First seen on securityboulevard.com Jump to…
-
Künstliche Intelligenz: Nordkorea erforscht KI-gestütztes Hacking
by
in SecurityNewsMit KI-gestützten Technologien will Nordkorea in Echtzeit auf Informationen reagieren und seine Cyberkriegsführung im Ausland verbessern. First seen on golem.de Jump to article: www.golem.de/news/kuenstliche-intelligenz-nordkorea-erforscht-ki-gestuetztes-hacking-2503-194552.html
-
Former NFL, Michigan Assistant Coach Matt Weiss Charged With Hacking for Athletes’ Intimate Photos
by
in SecurityNewsFormer NFL and University of Michigan assistant football coach Matt Weiss hacked into the computer accounts of thousands of college athletes seeking intimate photos and videos. The post Former NFL, Michigan Assistant Coach Matt Weiss Charged With Hacking for Athletes’ Intimate Photos appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/former-nfl-michigan-assistant-coach-matt-weiss-charged-with-hacking-for-athletes-intimate-photos/
-
Former Michigan football coach indicted in hacks of athlete databases of more than 100 colleges
by
in SecurityNewsFederal prosecutors said Matthew Weiss, a former assistant football coach at the University of Michigan, learned hacking skills to breach online databases, primarily targeting “female college athletes.” First seen on therecord.media Jump to article: therecord.media/former-michigan-football-assistant-coach-indicted-hacks-athletes
-
North Korea launches new unit with a focus on AI hacking, per report
by
in SecurityNewsNorth Korea is reportedly launching a new cybersecurity unit called Research Center 227 within its intelligence agency Reconnaissance General Bureau (RGB). © 2025 TechCrunch. All rights reserved. For personal use only. First seen on techcrunch.com Jump to article: techcrunch.com/2025/03/20/north-korea-launches-new-unit-with-a-focus-on-ai-hacking-per-report/
-
Taiwan critical infrastructure targeted by hackers with possible ties to Volt Typhoon
by
in SecurityNewsResearchers at Cisco Talos identified a hacking operation against Taiwan that appears to overlap with Chinese state-backed campaigns known as Volt Typhoon and Flax Typhoon. First seen on therecord.media Jump to article: therecord.media/taiwan-critical-infrastructure-hacking-uat-5918
-
HellCat hackers go on a worldwide Jira hacking spree
by
in SecurityNewsSwiss global solutions provider Ascom has confirmed a cyberattack on its IT infrastructure as a hacker group known as Hellcat targets Jira servers worldwide using compromised credentials. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/hellcat-hackers-go-on-a-worldwide-jira-hacking-spree/
-
State-Backed Hackers Exploiting Windows Zero-Day Since 2017
by
in SecurityNewsAt least 11 state-sponsored hacking groups from North Korea, Iran, Russia, and China have been actively exploiting a newly uncovered Windows zero-day vulnerability in cyber espionage and data theft attacks since 2017. Despite clear evidence of exploitation, Microsoft has declined… First seen on sensorstechforum.com Jump to article: sensorstechforum.com/zdi-can-25373-zero-day-exploited-since-2017/
-
Pwn2Own Automotive 2025 – 49 Zero-Day-Schwachstellen bei Hacking-Contest entdeckt
by
in SecurityNewsFirst seen on security-insider.de Jump to article: www.security-insider.de/white-hat-hacker-entdecken-zero-day-schwachstellen-automotive-a-e70a31333f09edca8bb8b47ccb33db6e/
-
Web3 Laundering Fears: OKX Suspends Platform Amidst Scrutiny
by
in SecurityNewsEarlier, OKX’s Web3 platform was accused of facilitating money laundering for North Korean hacking groups, with the illicit First seen on securityonline.info Jump to article: securityonline.info/web3-laundering-fears-okx-suspends-platform-amidst-scrutiny/