Tag: cyberattack
-
Gesetzesentwurf: BND bekommt Lizenz zum Hacken und Sabotieren
Tags: cyberattackDer BND soll künftig nicht mehr nur Informationen sammeln, sondern auch im Ausland zuschlagen dürfen – von Cyberangriffen bis zur Sabotage. First seen on golem.de Jump to article: www.golem.de/news/gesetzesentwurf-bnd-bekommt-lizenz-zum-hacken-und-sabotieren-2512-203489.html
-
Hackers Stole Millions of PornHub Users’ Data for Extortion
Plus: Cisco discloses a zero-day with no available patch, Venezuela accuses the US of a cyberattack, and more. First seen on wired.com Jump to article: www.wired.com/story/security-news-this-week-hackers-stole-millions-of-pornhub-users-data-for-extortion/
-
Hackers Stole Millions of PornHub Users’ Data for Extortion
Plus: Cisco discloses a zero-day with no available patch, Venezuela accuses the US of a cyberattack, and more. First seen on wired.com Jump to article: www.wired.com/story/security-news-this-week-hackers-stole-millions-of-pornhub-users-data-for-extortion/
-
Mikrosegmentierung zur Verhinderung erfolgreicher Angriffe
Ransomware befeuert ein cyberkriminelles Geschäftsmodell, dessen weltweites Volumen auf Billionen US-Dollar geschätzt wird. Die Angreifer nehmen weiterhin Unternehmen jeder Größe und Branche ins Visier. Herkömmliche Netzwerkverteidigungen, die darauf ausgelegt sind, Eindringlinge fernzuhalten, anstatt deren Aktivitäten nach dem Eindringen einzudämmen, reichen nicht mehr aus. Zero Networks rät daher zur Umsetzung modernisierten Mikrosegmentierung, die seitliche Bewegungen automatisch……
-
Mikrosegmentierung zur Verhinderung erfolgreicher Angriffe
Ransomware befeuert ein cyberkriminelles Geschäftsmodell, dessen weltweites Volumen auf Billionen US-Dollar geschätzt wird. Die Angreifer nehmen weiterhin Unternehmen jeder Größe und Branche ins Visier. Herkömmliche Netzwerkverteidigungen, die darauf ausgelegt sind, Eindringlinge fernzuhalten, anstatt deren Aktivitäten nach dem Eindringen einzudämmen, reichen nicht mehr aus. Zero Networks rät daher zur Umsetzung modernisierten Mikrosegmentierung, die seitliche Bewegungen automatisch……
-
Russia was behind a destructive cyber attack on a water utility in 2024, Denmark says
Denmark has blamed Russia for a destructive cyberattack on a water utility, calling it part of Moscow’s hybrid campaign against Western critical infrastructure. Denmark has accused Russia of orchestrating destructive cyberattacks against a water utility in 2024, framing them as part of broader hybrid attacks on Western critical infrastructure. Denmark’s Defence Intelligence Service attributed a…
-
‘Critical’ WatchGuard Firebox Vulnerability Exploited In Attacks
A critical-severity vulnerability impacting customers of WatchGuard’s next-generation firewall, Firebox, has seen exploitation in cyberattacks, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) confirmed Friday. First seen on crn.com Jump to article: www.crn.com/news/security/2025/cisa-critical-watchguard-firebox-vulnerability-exploited-in-attacks
-
‘Critical’ WatchGuard Firebox Vulnerability Exploited In Attacks
A critical-severity vulnerability impacting customers of WatchGuard’s next-generation firewall, Firebox, has seen exploitation in cyberattacks, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) confirmed Friday. First seen on crn.com Jump to article: www.crn.com/news/security/2025/cisa-critical-watchguard-firebox-vulnerability-exploited-in-attacks
-
‘Critical’ WatchGuard Firebox Vulnerability Exploited In Attacks
A critical-severity vulnerability impacting customers of WatchGuard’s next-generation firewall, Firebox, has seen exploitation in cyberattacks, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) confirmed Friday. First seen on crn.com Jump to article: www.crn.com/news/security/2025/cisa-critical-watchguard-firebox-vulnerability-exploited-in-attacks
-
10 Major Cyberattacks And Data Breaches In 2025
Among the major cyberattacks and data breaches in 2025 were nation-state infiltration by China and North Korea, as well as massive data theft and ransomware attacks. First seen on crn.com Jump to article: www.crn.com/news/security/2025/10-major-cyberattacks-and-data-breaches-in-2025
-
Nigeria arrests dev of Microsoft 365 ‘Raccoon0365’ phishing platform
The Nigerian police have arrested three individuals linked to targeted Microsoft 365 cyberattacks via Raccoon0365 phishing-as-a-service. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/nigeria-arrests-dev-of-microsoft-365-raccoon0365-phishing-platform/
-
Denmark summons Russian ambassador over alleged cyberattacks on water utility, elections
Russia’s ambassador to Copenhagen, Vladimir Barbin, confirmed to Russian state media on Friday that he had been called to the Danish foreign ministry, but rejected the accusations as unfounded. First seen on therecord.media Jump to article: therecord.media/denmark-summons-russian-ambassador-cyberattack-elections
-
Hacks, thefts, and disruption: The worst data breaches of 2025
TechCrunch looks back at the biggest data breaches, disruptive cyberattacks, and damaging hacks of 2025, from the raiding of U.S. government databases to a hack every month in South Korea. First seen on techcrunch.com Jump to article: techcrunch.com/2025/12/19/hacks-thefts-and-disruption-the-worst-data-breaches-of-2025/
-
Hacks, thefts and disruption: The worst data breaches of 2025
TechCrunch looks back at the biggest data breaches, disruptive cyberattacks, and damaging hacks of 2025, from the raiding of U.S. government databases to a hack every month in South Korea. First seen on techcrunch.com Jump to article: techcrunch.com/2025/12/19/hacks-thefts-and-disruption-the-worst-data-breaches-of-2025/
-
Denmark blames Russia for destructive cyberattack on water utility
Danish intelligence officials blamed Russia for orchestrating cyberattacks against Denmark’s critical infrastructure, as part of Moscow’s hybrid attacks against Western nations. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/denmark-blames-russia-for-destructive-cyberattack-on-water-utility/
-
Microsoft-Konto gekapert: Hacker entwickeln Cyberangriffe mit Captchas weiter so schützt du dich
First seen on t3n.de Jump to article: t3n.de/news/microsoft-konto-gekapert-hacker-cyberangriffe-captchas-weiterentwickelt-1722368/
-
Der Raspberry-Pi-Weckruf für CISOs
Tags: access, authentication, ceo, ciso, control, cyberattack, dns, firewall, group, hacker, Hardware, infrastructure, linux, monitoring, office, risk, switch, tool, voip, vpnKleines Device, große Wirkung.Mitte Dezember wurde eine Fähre in Besitz der Mediterranean Shipping Company über Stunden in einem französischen Hafen festgesetzt, wie Bloomberg berichtete. Der Grund: Es bestand der Verdacht, dass russische Cyberkriminelle versucht haben, das Netzwerk des Schiffs zu hacken mit einem Raspberry Pi. Dieser war demnach mit einem Mobilfunkmodem gekoppelt, das den Fernzugriff…
-
Ink Dragon Angriffe verwandeln Opfer in Relais-Knoten
Ink Dragon steht exemplarisch für eine neue Generation staatlicher Cyber-Operationen. Angriffe sind keine isolierten Ereignisse mehr, sondern Teil eines größeren, verteilten Systems. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/ink-dragon-angriffe-verwandeln-opfer-in-relais-knoten/a43242/
-
Im November 2025 sind Cyberangriffe im DACH-Raum um zehn Prozent zurückgegangen
Check Point Research (CPR), die Sicherheitsforschungsabteilung von Check Point Software Technologies hat seinen Global Threat Intelligence Report für November 2025 veröffentlicht. Der Bericht zeigt, dass Unternehmen im Laufe des vergangenen Monats weltweit durchschnittlich 2.003 Cyber-Angriffen pro Woche ausgesetzt waren. Dies entspricht einem Anstieg von drei Prozent gegenüber Oktober und einem Anstieg von vier Prozent gegenüber…
-
Im November 2025 sind Cyberangriffe im DACH-Raum um zehn Prozent zurückgegangen
Check Point Research (CPR), die Sicherheitsforschungsabteilung von Check Point Software Technologies hat seinen Global Threat Intelligence Report für November 2025 veröffentlicht. Der Bericht zeigt, dass Unternehmen im Laufe des vergangenen Monats weltweit durchschnittlich 2.003 Cyber-Angriffen pro Woche ausgesetzt waren. Dies entspricht einem Anstieg von drei Prozent gegenüber Oktober und einem Anstieg von vier Prozent gegenüber…
-
NHS tech supplier probes cyberattack on internal systems
Tags: cyberattackAround 2,000 GP practices use its products First seen on theregister.com Jump to article: www.theregister.com/2025/12/18/nhs_tech_supplier_cyberattack/
-
NHS tech supplier probes cyberattack on internal systems
Tags: cyberattackAround 2,000 GP practices use its products First seen on theregister.com Jump to article: www.theregister.com/2025/12/18/nhs_tech_supplier_cyberattack/
-
The Biggest Cyber Stories of the Year: What 2025 Taught Us
Tags: access, attack, authentication, awareness, banking, breach, business, ciso, cloud, compliance, container, control, cyber, cyberattack, cybersecurity, data, data-breach, email, encryption, endpoint, exploit, government, healthcare, iam, identity, incident, incident response, Internet, law, metric, mfa, monitoring, network, privacy, regulation, resilience, risk, service, software, strategy, supply-chain, technology, threat, tool, vulnerability, vulnerability-management, zero-day, zero-trustThe Biggest Cyber Stories of the Year: What 2025 Taught Us madhav Thu, 12/18/2025 – 10:30 2025 didn’t just test cybersecurity; it redefined it. From supply chains and healthcare networks to manufacturing floors and data centers, the digital world was reminded of a simple truth: everything is connected, and everything is at risk. Data Security…
-
Industrial routers bear the brunt of OT cyberattacks, new Forescout research finds
Industrial routers and other OT perimeter devices are absorbing the majority of cyberattacks targeting operational technology environments, according to new Forescout Vedere Labs research. Analysing 90 days of real-world honeypot data, researchers found that 67% of malicious activity was directed at OT perimeter devices, such as industrial routers and firewalls, compared with 33% aimed at…
-
Russlands Einfluss Kritik an Lücken bei Cybersicherheit
Die Bundesregierung wirft Russland eine massive Cyberattacke sowie die Verbreitung von Falschinformationen im jüngsten Bundestagswahlkampf vor.Die Grünen sehen sich durch die jüngsten Erkenntnisse über russische Einflussoperationen im Bundestagswahlkampf in ihrer Einschätzung bestärkt, dass die aktuellen Maßnahmen zum Schutz der parlamentarischen Demokratie nicht ausreichen. “Dass unsere Demokratie und ihre Institutionen zunehmend hybriden Angriffen autoritärer Regime ausgesetzt…
-
Cisco Warns of Active Cyberattack Exploiting Critical AsyncOS Vulnerability
Cisco has identified an ongoing cyberattack campaign exploiting vulnerabilities in a subset of its appliances running Cisco AsyncOS Software. The attack specifically affects Cisco Secure Email Gateway and Cisco Secure Email and Web Manager appliances, allowing threat actors to execute arbitrary commands with root privileges. This campaign has been tracked under CVE-2025-20393 and has been classified as critical with a CVSS 10.0 rating. First seen on thecyberexpress.com…
-
SoundCloud Cyberattack Leaves 28M Users Exposed
The breach has already triggered widespread chaos across the platform, with users worldwide reporting connection failures and cryptic error messages. The post SoundCloud Cyberattack Leaves 28M Users Exposed appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-soundcloud-cyberattack/
-
SoundCloud Cyberattack Leaves 28M Users Exposed
The breach has already triggered widespread chaos across the platform, with users worldwide reporting connection failures and cryptic error messages. The post SoundCloud Cyberattack Leaves 28M Users Exposed appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-soundcloud-cyberattack/

