Tag: hacking
-
North Korean hackers join Qilin ransomware gang
by
in SecurityNewsMicrosoft says a North Korean hacking group tracked as Moonstone Sleet has deployed Qilin ransomware payloads in a limited number of attacks. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/microsoft-north-korean-hackers-now-deploying-qilin-ransomware/
-
DEF CON 32 War Stories Hacking Millions Of Modems And Investigating Who Hacked My Modem
by
in SecurityNewsAuthor/Presenter: Sam Curry Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/def-con-32-war-stories-hacking-millions-of-modems-and-investigating-who-hacked-my-modem/
-
DoJ Busts Alleged Global HackingHire Network of ‘Cyber Mercenaries’
Targets included the U.S. Treasury Department, journalists, and religious organisations, and the attacks intended to steal data and suppress free speech. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/us-doj-charges-chinese-nationals-hacking/
-
US charges Chinese nationals in cyberattacks on Treasury, dissidents and more
by
in SecurityNewsU.S. prosecutors accused a dozen Chinese nationals with hacking into the Treasury Department and other entities as part of a web extending from private companies into China’s state security agencies. First seen on therecord.media Jump to article: therecord.media/doj-charges-chinese-nationals-isoon-cyberattacks-treasury
-
Catalan court says NSO Group executives can be charged in spyware investigation
by
in SecurityNewsThe ruling said that a lower court can charge two NSO Group co-founders and a former executive of two affiliate companies for the alleged hacking of a lawyer. First seen on techcrunch.com Jump to article: techcrunch.com/2025/03/05/catalan-court-says-nso-group-executives-can-be-charged-in-spyware-investigation/
-
Justice Department charges Chinese hackershire linked to Treasury breach
The individuals are accused of hacking over 100 U.S. organizations over the course of a decade First seen on techcrunch.com Jump to article: techcrunch.com/2025/03/05/justice-department-charges-chinese-hackers-for-hire-linked-to-treasury-breach/
-
China-Linked Silk Typhoon Expands Cyber Attacks to IT Supply Chains for Initial Access
by
in SecurityNews
Tags: access, attack, china, corporate, cyber, exploit, flaw, hacking, intelligence, microsoft, supply-chain, tactics, technology, threat, zero-dayThe China-lined threat actor behind the zero-day exploitation of security flaws in Microsoft Exchange servers in January 2021 has shifted its tactics to target the information technology (IT) supply chain as a means to obtain initial access to corporate networks.That’s according to new findings from the Microsoft Threat Intelligence team, which said the Silk Typhoon…
-
Enhancing security with Microsoft’s expanded cloud logs
by
in SecurityNewsNation-state-sponsored hacking stories are a big part of everyone’s favourite Hollywood movies”‰”, “‰that is, until it becomes a real-life story of our own compromised personal or corporate sensitive data ending up on the dark web or in hackers’ hands. In real life, cyber espionage groups’ activities trigger stringent security enforcement. First in the government sector,…
-
Catalan court orders former NSO Group executives be indicted for spyware abuses
by
in SecurityNewsA provincial court in Barcelona has ordered that three former senior executives at NSO Group, a prominent spyware manufacturer, be indicted for their alleged role in a high-profile hacking scandal in which at least 63 Catalan civil society members were targeted with the company’s surveillance technology. First seen on therecord.media Jump to article: therecord.media/catalan-court-orders-nso-execs-investigated
-
US Military Personnel Arrested for Hacking 15 Telecom Providers
by
in SecurityNewsFederal prosecutors have filed a detention memorandum urging the court to indefinitely detain Cameron John Wagenius, a 21-year-old active-duty U.S. Army soldier stationed at Fort Cavazos, Texas, following his alleged involvement in a multi-state cybercrime campaign targeting at least 15 telecommunications providers. The charges, unsealed ahead of a March 3 detention hearing, reveal a sprawling…
-
Network Penetration Testing Checklist 2025
by
in SecurityNews
Tags: cyber, cyberattack, cybersecurity, exploit, firewall, hacker, hacking, malicious, network, penetration-testing, router, tool, vulnerabilityNetwork penetration testing is a cybersecurity practice that simulates cyberattacks on an organization’s network to identify vulnerabilities and improve security defenses. Ethical hackers, or penetration testers, use tools and techniques to mimic real-world hacking attempts, targeting network components like routers, firewalls, servers, and endpoints. The goal is to uncover weaknesses before malicious actors exploit them,…
-
Hackers can Crack Into Car Cameras Within Minutes Exploiting Vulnerabilities
by
in SecurityNews
Tags: breach, cctv, conference, cyber, cybersecurity, data, data-breach, exploit, hacker, hacking, privacy, technology, vulnerabilityAt the upcoming Black Hat Asia 2025 conference, cybersecurity experts will unveil a groundbreaking vulnerability in modern dashcam technology, exposing how hackers can exploit these devices to breach privacy and steal sensitive data. The session, titled DriveThru Car Hacking: Fast Food, Faster Data Breach, will be held on April 3, 2025, at Marina Bay Sands,…
-
US Soldier Intends to Admit Hacking 15 Telecom Carriers
by
in SecurityNewsThe federal government views the defendant as a flight risk and danger to the community due to his ability to access sensitive and private information. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/us-soldier-admits-hacking-15-telecom-carriers
-
Trump administration retreats in fight against Russian cyber threats
by
in SecurityNews
Tags: attack, control, cyber, cybersecurity, hacking, infrastructure, intelligence, russia, threat, vulnerabilityRecent incidents indicate US is no longer characterizing Russia as a cybersecurity threat, marking a radical departure: ‘Putin is on the inside now'<ul><li>Don’t let a billionaire’s algorithm control what you read. <a href=”https://app.adjust.com/1ja835wd”>Download our free app to get trusted reporting.</li></ul>The <a href=”https://www.theguardian.com/us-news/trump-administration”>Trump administration has publicly and privately signaled that it does not believe <a href=”https://www.theguardian.com/world/russia”>Russia…
-
China hacking has reached ‘inflection point’
by
in SecurityNewsIn its 2025 Global Threat Report, CrowdStrike observed an increase in China’s cyber capabilities, with a focus on espionage and ‘pre-positioning’ itself in critical environments. First seen on techtarget.com Jump to article: www.techtarget.com/searchsecurity/news/366619774/CrowdStrike-China-hacking-has-reached-inflection-point
-
Feds: Army soldier suspected of AT&T heist Googled ‘can hacking be treason,’ ‘defecting to Russia’
by
in SecurityNewsFYI: What NOT to search after committing a crime First seen on theregister.com Jump to article: www.theregister.com/2025/02/27/army_soldier_accused_of_att/
-
Feds: Army soldier accused of AT&T heist Googled ‘can hacking be treason,’ ‘defecting to Russia’
by
in SecurityNewsFYI: What NOT to search after committing a crime First seen on theregister.com Jump to article: www.theregister.com/2025/02/27/army_soldier_accused_of_att/
-
New White House Plan to Track Spending Raises Cyber Risks
by
in SecurityNewsTrump’s Procurement Tracking Directive Could Expose Vast Government Data to Threats. The White House is mandating federal agencies to track and justify every procurement, a move aimed at transparency but one that experts warn could expose troves of sensitive financial data to hacking, nation-state cyber threats and potential supply chain vulnerabilities across government systems. First…
-
GitVenom campaign targets gamers and crypto investors by posing as fake GitHub projects
by
in SecurityNewsGitVenom malware campaign targets gamers and crypto investors by posing as open-source projects on GitHub. Kaspersky researchers warn of a malware campaign, dubbed GitVenom, targeting GitHub users. The threat actors behind this campaign created hundreds of fake GitHub repositories with malicious code, disguising them as automation tools, crypto bots, and hacking utilities. The attackers used…
-
Chinese-Backed Silver Fox Plants Backdoors in Healthcare Networks
by
in SecurityNewsForescout observed the recently identified Chinese hacking group using medical imaging software applications to deliver malware First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/chinese-silver-fox-backdoors/
-
Dragos: Surge of new hacking groups enter ICS space as states collaborate with private actors
by
in SecurityNewsStates are increasingly collaborating with cybercriminal groups to share resources and amplify attacks on critical infrastructure in rival nations, a new report finds. First seen on cyberscoop.com Jump to article: cyberscoop.com/dragos-ot-ics-annual-report-states-collaborating-with-private-hacking-groups/
-
OpenAI bans ChatGPT accounts used by North Korean hackers
by
in SecurityNewsOpenAI says it blocked several North Korean hacking groups from using its ChatGPT platform to research future targets and find ways to hack into their networks. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/openai-bans-chatgpt-accounts-used-by-north-korean-hackers/
-
EU sanctions North Korean tied to Lazarus group over involvement in Ukraine war
by
in SecurityNewsThe latest package of EU sanctions related to Russia’s invasion of Ukraine included the leader of the North Korean intelligence agency known for backing the Lazarus group and other high-profile hacking operations. First seen on therecord.media Jump to article: therecord.media/eu-sanctions-north-korea-ukraine-war-lazarus-group
-
DEF CON 32 Ground Control to Major Threat Hacking the Space Link Extension Protocol
by
in SecurityNewsAuthors/Presenters: Andrzej Olch Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/def-con-32-ground-control-to-major-threat-hacking-the-space-link-extension-protocol/
-
North Korean hackers linked to $1.5 billion ByBit crypto heist
by
in SecurityNewsOver the weekend, blockchain security companies and experts have linked North Korea’s Lazarus hacking group to the theft of over $1.5 billion from cryptocurrency exchange Bybit. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/north-korean-hackers-linked-to-15-billion-bybit-crypto-heist/
-
Leaked Black Basta chat logs reveal the gang’s operations
by
in SecurityNewsLeaked Black Basta chat logs reveal internal conflicts, exposing member details and hacking tools as the gang reportedly falls apart. An unknown actor, named ExploitWhispers, leaked Matrix chat logs of the Black Basta ransomware gang revealing internal conflicts, and exposing member details and hacking tools as the gang reportedly collapses. ExploitWhispers first uploaded the chat…
-
Ukrainian hackers claim breach of Russian loan company linked to Putin’s ex-wife
A pro-Ukraine hacking group claimed that it was behind an attack on CarMoney, a Russian microfinance company with reported connections to Vladimir Putin’s ex-wife. First seen on therecord.media Jump to article: therecord.media/russia-carmoney-data-breach-ukrainian-cyber-alliance
-
Critical UniFi Protect Camera Vulnerability Enables Remote Code Execution Attacks
by
in SecurityNewsUbiquiti Networks has issued an urgent security advisory (Bulletin 046) warning of multiple critical vulnerabilities in its UniFi Protect camera ecosystem, including a high-severity remote code execution (RCE) flaw that could allow attackers to hijack devices and infiltrate network infrastructure. The vulnerabilities, discovered during the Pwn2Own 2025 hacking competition, affect UniFi Protect Cameras (firmware v4.74.88…
-
Firing of 130 CISA staff worries cybersecurity industry
by
in SecurityNewsCybersecurity concerns: Alexander Garcia-Tobar, CEO of email authentication provider Valimail, said the new administration’s actions are causing significant concern among security professionals. “Many of us are advocating for cybersecurity to be seen as the bi-partisan effort it should be,” he said via emai, but “the Trump administration has taken a sledgehammer to cancelling or disbanding…