Tag: hacking
-
Lengthy disruption of Russian internet provider claimed by Ukrainian hacker group
A multi-day outage of internet services by Lovit, a widely used provider in cities such as Moscow and St. Petersburg, was claimed by the IT Army, a pro-Ukraine hacking group. First seen on therecord.media Jump to article: therecord.media/russia-isp-lovit-outages-claimed-ukraine-it-army
-
IngressNightmare Flaws Expose Kubernetes Clusters to Remote Hacking
by
in SecurityNewsCritical remote code execution vulnerabilities found by Wiz researchers in Ingress NGINX Controller for Kubernetes. The post IngressNightmare Flaws Expose Kubernetes Clusters to Remote Hacking appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/ingressnightmare-flaws-expose-many-kubernetes-clusters-to-remote-hacking/
-
New Specter Insight C2 Tool Fuels ClickFix-Based Hacking Campaigns
by
in SecurityNewsA recent cybersecurity investigation has uncovered a previously unidentified Command and Control (C2) framework, dubbedSpecter Insight C2. This discovery was made by a team of researchers who have been analyzing recent hacking campaigns, including those utilizingClickFixtactics, as per a report shared by DFIR in X. The emergence of this new tool suggests an evolution in…
-
Tech specialist files legal claim after being refused security clearance for MI6 role
by
in SecurityNews
Tags: hackingAn IT specialist has asked the Investigatory Powers Tribunal to investigate a series of hacking incidents after disclosing their social media accounts to MI6 vetting staff First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366620867/Tech-specialist-files-legal-claim-after-being-refused-security-clearance-for-MI6-role
-
IngressNightmare Flaws Expose Many Kubernetes Clusters to Remote Hacking
by
in SecurityNewsCritical remote code execution vulnerabilities found by Wiz researchers in Ingress NGINX Controller for Kubernetes. The post IngressNightmare Flaws Expose Many Kubernetes Clusters to Remote Hacking appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/ingressnightmare-flaws-expose-many-kubernetes-clusters-to-remote-hacking/
-
Wheelchair Firm Ramps Up Notices to 500,000 for Email Hack
by
in SecurityNewsLarge Health Data Breach Started With Phishing Lure in Employees’ Email. Tennessee-based Numotion, one of the largest U.S. providers of wheelchairs and other health-related mobility products is notifying nearly 500,000 people of a 2024 email hacking incident that potentially compromised their personal and health-related information. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/wheelchair-firm-ramps-up-notices-to-500000-for-email-hack-a-27814
-
Encrypted Messaging Apps Promise Privacy. Government Transparency Is Often the Price
by
in SecurityNewsPublic officials and private citizens are consistently warned about hacking and data leaks, but technologies designed to increase privacy often decrease government transparency. The post Encrypted Messaging Apps Promise Privacy. Government Transparency Is Often the Price appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/encrypted-messaging-apps-promise-privacy-government-transparency-is-often-the-price/
-
North Korea Launches Military Research Facility to Strengthen Cyber Warfare Operations
by
in SecurityNewsNorth Korea has taken a significant step in enhancing its cyber warfare capabilities by establishing a new research center, known as Research Center 227, under the military’s Reconnaissance General Bureau (RGB). This move is part of a broader strategy to bolster the country’s offensive cyber operations, particularly focusing on AI-powered hacking technologies. Background and Objectives…
-
North Korea launches hacking hub focused on artificial intelligence
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/news/north-korea-launches-hacking-hub-focused-on-artificial-intelligence
-
Chinese Hackers Exploit Unpatched Servers in Taiwan
by
in SecurityNewsUAT-5918 Breaches Taiwan’s Critical Sectors Using N-Day Flaws for Cyberespionage. Hackers with ties to China-based hacking groups including Volt Typhoon are breaching Taiwan’s critical infrastructure by exploiting unpatched web and application servers as entry points for a cyberespionage campaign. Cisco Talos threat hunters identified the new threat actor as UAT-5918. First seen on govinfosecurity.com Jump…
-
Ex-Michigan, Ravens Football Coach Charged with Hacking Athlete Accounts
by
in SecurityNewsMatthew Weiss, former football coach for the University of Michigan and the Baltimore Ravens, for almost 10 years accessed the social media and other online accounts of thousands of student athletes and downloaded personal information and intimate images, said prosecutors who indicted for illegal computer access and identity theft. First seen on securityboulevard.com Jump to…
-
Künstliche Intelligenz: Nordkorea erforscht KI-gestütztes Hacking
by
in SecurityNewsMit KI-gestützten Technologien will Nordkorea in Echtzeit auf Informationen reagieren und seine Cyberkriegsführung im Ausland verbessern. First seen on golem.de Jump to article: www.golem.de/news/kuenstliche-intelligenz-nordkorea-erforscht-ki-gestuetztes-hacking-2503-194552.html
-
Former NFL, Michigan Assistant Coach Matt Weiss Charged With Hacking for Athletes’ Intimate Photos
by
in SecurityNewsFormer NFL and University of Michigan assistant football coach Matt Weiss hacked into the computer accounts of thousands of college athletes seeking intimate photos and videos. The post Former NFL, Michigan Assistant Coach Matt Weiss Charged With Hacking for Athletes’ Intimate Photos appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/former-nfl-michigan-assistant-coach-matt-weiss-charged-with-hacking-for-athletes-intimate-photos/
-
Former Michigan football coach indicted in hacks of athlete databases of more than 100 colleges
by
in SecurityNewsFederal prosecutors said Matthew Weiss, a former assistant football coach at the University of Michigan, learned hacking skills to breach online databases, primarily targeting “female college athletes.” First seen on therecord.media Jump to article: therecord.media/former-michigan-football-assistant-coach-indicted-hacks-athletes
-
North Korea launches new unit with a focus on AI hacking, per report
by
in SecurityNewsNorth Korea is reportedly launching a new cybersecurity unit called Research Center 227 within its intelligence agency Reconnaissance General Bureau (RGB). © 2025 TechCrunch. All rights reserved. For personal use only. First seen on techcrunch.com Jump to article: techcrunch.com/2025/03/20/north-korea-launches-new-unit-with-a-focus-on-ai-hacking-per-report/
-
Taiwan critical infrastructure targeted by hackers with possible ties to Volt Typhoon
by
in SecurityNewsResearchers at Cisco Talos identified a hacking operation against Taiwan that appears to overlap with Chinese state-backed campaigns known as Volt Typhoon and Flax Typhoon. First seen on therecord.media Jump to article: therecord.media/taiwan-critical-infrastructure-hacking-uat-5918
-
HellCat hackers go on a worldwide Jira hacking spree
by
in SecurityNewsSwiss global solutions provider Ascom has confirmed a cyberattack on its IT infrastructure as a hacker group known as Hellcat targets Jira servers worldwide using compromised credentials. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/hellcat-hackers-go-on-a-worldwide-jira-hacking-spree/
-
State-Backed Hackers Exploiting Windows Zero-Day Since 2017
by
in SecurityNewsAt least 11 state-sponsored hacking groups from North Korea, Iran, Russia, and China have been actively exploiting a newly uncovered Windows zero-day vulnerability in cyber espionage and data theft attacks since 2017. Despite clear evidence of exploitation, Microsoft has declined… First seen on sensorstechforum.com Jump to article: sensorstechforum.com/zdi-can-25373-zero-day-exploited-since-2017/
-
Pwn2Own Automotive 2025 – 49 Zero-Day-Schwachstellen bei Hacking-Contest entdeckt
by
in SecurityNewsFirst seen on security-insider.de Jump to article: www.security-insider.de/white-hat-hacker-entdecken-zero-day-schwachstellen-automotive-a-e70a31333f09edca8bb8b47ccb33db6e/
-
Web3 Laundering Fears: OKX Suspends Platform Amidst Scrutiny
by
in SecurityNewsEarlier, OKX’s Web3 platform was accused of facilitating money laundering for North Korean hacking groups, with the illicit First seen on securityonline.info Jump to article: securityonline.info/web3-laundering-fears-okx-suspends-platform-amidst-scrutiny/
-
Poisoned Windows shortcuts found to be a favorite of Chinese, Russian, N. Korean state hackers
by
in SecurityNewsThe Zero Day Initiative measured the prevalence of manipulated Windows shortcut files in campaigns attributed to nation-state hacking groups, finding at least 11 exploited a bug that allows malicious use of the files. First seen on therecord.media Jump to article: therecord.media/windows-lnk-files-nation-state-hacking-campaigns
-
New Windows zero-day exploited by 11 state hacking groups since 2017
by
in SecurityNewsAt least 11 state-backed hacking groups from North Korea, Iran, Russia, and China have been exploiting a new Windows vulnerability in data theft and cyber espionage zero-day attacks since 2017. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-windows-zero-day-exploited-by-11-state-hacking-groups-since-2017/
-
Western Alliance Bank Discloses Data Breach Linked to Cleo Hack
by
in SecurityNewsThe personal information of 22,000 Western Alliance Bank customers was stolen in a data breach linked to Cl0p’s hacking of the Cleo file transfer tool. The post Western Alliance Bank Discloses Data Breach Linked to Cleo Hack appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/western-alliance-bank-discloses-data-breach-linked-to-cleo-hack/
-
Chinese Hackers Target European Diplomats with Malware
by
in SecurityNewsMirrorFace Expands Operations, Revives Anel Backdoor for Espionage. A threat actor associated with Chinese cyberespionage campaigns against Japan stepped outside its East Asian comfort zone to target a European organization with a refreshed set of hacking tools. A hacking group tracked as MirrorFace and Earth Kasha deployed a backdoor once exclusively used by APT10. First…
-
Crypto Platform OKX Suspends Tool Abused by North Korean Hackers
by
in SecurityNewsCryptocurrency platform OKX has announced the temporary suspension of its Decentralized Exchange (DEX) aggregator tool. This decision comes on the heels of coordinated attacks by certain media outlets and unsuccessful attempts by the notorious Lazarus Group”, a hacking entity linked to North Korea”, to exploit OKX’s DeFi services. Background on the Lazarus Group The Lazarus…
-
Hardware Hacking: Tools, Tips Tricks for Total Domination
by
in SecurityNewsJoin Paul Asadoorian for an eye-opening webinar exploring the meteoric growth of affordable hardware hacking devices, from the FlipperZero to ESP32-based platforms, and their implications for cybersecurity. This session is a must for security professionals, researchers, IT decision-makers, and anyone concerned about balancing innovation with security in the age of cheap, accessible hardware hacking tools….…
-
Crypto exchange OKX shuts down tool used by North Korean hackers to launder stolen funds
by
in SecurityNewsOKX said it detected a coordinated effort by one of North Korea’s most prolific hacking outfits to misuse its decentralized finance (DeFi) services. First seen on therecord.media Jump to article: therecord.media/crypto-okx-shuts-down-exchange
-
Hackers are exploiting Fortinet firewall bugs to plant ransomware
by
in SecurityNewsSecurity researchers say that a threat actor it calls Mora_001 has ‘close ties’ to the Russia-linked hacking group First seen on techcrunch.com Jump to article: techcrunch.com/2025/03/17/hackers-are-exploiting-fortinet-firewall-bugs-to-plant-ransomware/
-
FCC creates national security council to counter cyber threats from China
by
in SecurityNews
Tags: 5G, access, ai, attack, breach, china, communications, computing, cyber, cyberattack, cybersecurity, data, espionage, government, group, hacking, incident, infrastructure, Internet, microsoft, office, strategy, supply-chain, technology, threat, vulnerabilityThree-pronged strategy: The council will pursue a tripartite strategy focusing on reducing dependency, mitigating vulnerabilities, and ensuring American technological leadership.First, it aims to reduce American technology and telecommunications sectors’ trade and supply chain dependencies on foreign adversaries. This goal aligns with broader government efforts to “friend-shore” critical technology supply chains and decrease reliance on potentially…
-
UK Cybersecurity Weekly News Roundup 16 March 2025
by
in SecurityNews
Tags: access, apple, attack, backdoor, backup, compliance, control, cyber, cyberattack, cybercrime, cybersecurity, data, encryption, finance, firewall, government, group, hacking, insurance, law, lockbit, malicious, network, office, privacy, ransomware, regulation, risk, russia, service, software, virusWelcome to this week’s edition of our cybersecurity news roundup, bringing you the latest developments and insights from the UK and beyond. UK Government’s Stance on Encryption Raises Global Concerns The UK government has ordered Apple to provide backdoor access to iCloud users’ encrypted backups under the Investigatory Powers Act of 2016. This secret order…