Tag: hacker
-
Bitfinex hacker Ilya Lichtenstein credits Trump for early release from prison
Ilya Lichtenstein, who pled guilty to money laundering charges tied to his role in the massive hack of crypto exchange Bitfinex, has apparently been released early from prison. First seen on techcrunch.com Jump to article: techcrunch.com/2026/01/03/bitfinex-hacker-ilya-lichtenstein-credits-trump-for-early-release-from-prison/
-
RondoDox Botnet is Using React2Shell to Hijack Thousands of Unpatched Devices
RondoDox hackers exploit the React2Shell flaw in Next.js to target 90,000+ devices, including routers, smart cameras, and small business websites. First seen on hackread.com Jump to article: hackread.com/rondodox-botnet-react2shell-hijack-unpatched-devices/
-
Pakistan-linked hackers target Indian government, universities in new spying campaign
The campaign has been attributed to APT36, also known as Transparent Tribe, a long-running threat actor accused of spying on Indian government bodies, military-linked organizations and universities. First seen on therecord.media Jump to article: therecord.media/pakistan-linked-hacking-group-targets-indian-orgs
-
Tokyo FM Data Breach: Hacker Claims Over 3 Million Records Stolen
Tokyo FM is investigating claims of a massive data breach involving 3 million records. Learn what information was allegedly taken and how you can stay safe. First seen on hackread.com Jump to article: hackread.com/tokyo-fm-data-breach-hacker-3-million-records-stolen/
-
Hacker Claims 200GB Data Theft From European Space Agency, Here’s What We Know
The European Space Agency confirmed a cyber incident after a hacker claimed to access and steal data from external collaboration servers. The post Hacker Claims 200GB Data Theft From European Space Agency, Here’s What We Know appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-hacker-claims-200gb-data-theft-european-space-agency/
-
Hacker Group Claims Responsibility for Alleged Tokyo FM Broadcasting Breach
A threat actor operating under the alias >>victim
-
Careto Hacker Group Resurfaces After a Decade, Unleashing New Attack Techniques
The legendary Careto threat actor, also known as >>The Mask,
-
Wie KI die Cybersicherheit neu gestaltet
Tags: ai, ciso, cloud, cyber, cyberattack, cybersecurity, cyersecurity, data, encryption, gartner, governance, group, guide, hacker, incident response, infrastructure, microsoft, phishing, resilience, risk, sans, soc, supply-chain, threat, tool, vulnerability-managementKünstliche Intelligenz und insbesondere Generative KI dringt immer tiefer in die Sicherheitsprozesse vor.Generative KI (GenAI) ist zu einem allgegenwärtigen Werkzeug in Unternehmen geworden. Laut einer Umfrage der Boston Consulting Group nutzen 50 Prozent der Unternehmen die Technologie, um Arbeitsabläufe neu zu gestalten. 77 Prozent der Befragten sind überzeugt, dass KI-Agenten in den nächsten drei bis…
-
Hacker Claims European Space Agency Breach, Selling 200GB of Data
A hacker using the alias 888 is claiming responsibility for a major data breach affecting the European Space… First seen on hackread.com Jump to article: hackread.com/hacker-european-space-agency-data-breach/
-
ESA disclosed a data breach, hackers breached external servers
ESA confirmed a data breach after a hacker offered to sell stolen data, confirming that external science servers were compromised. The European Space Agency (ESA) disclosed a data breach after a threat actor offered to sell data allegedly stolen from the organization. A hacker who goes online with the moniker “888” announced on BreachForums the…
-
Daran scheitert Passwordless
Passwortlose Authentifizierung im Unternehmen einzuführen, ist nur auf dem Papier einfach.Etliche Enterprise-CISOs versuchen schon seit mehr als einer Dekade, Passwörter hinter sich zu lassen. Weil aber diverse Legacy-Systeme ausschließlich auf Kennwörter ausgelegt sind, stoßen sie dabei immer wieder auf technische Hürden. Das spiegelt auch der aktuelle “ID IQ Report 2026″ von RSA (Download gegen Daten)…
-
Widely Used Malicious Extensions Steal ChatGPT, DeepSeek Conversations
Threat actors used two malicious Chrome extensions that have 900,000 users to steal their chats with AI models like ChatGPT and DeepSeek and browser history. The incident is the latest in a growing string of attacks in which hackers weaponized browser extensions to exfiltrate huge amounts of sensitive data. First seen on securityboulevard.com Jump to…
-
Widely Used Malicious Extensions Steal ChatGPT, DeepSeek Conversations
Threat actors used two malicious Chrome extensions that have 900,000 users to steal their chats with AI models like ChatGPT and DeepSeek and browser history. The incident is the latest in a growing string of attacks in which hackers weaponized browser extensions to exfiltrate huge amounts of sensitive data. First seen on securityboulevard.com Jump to…
-
Hackers Promote “VOID” AV Killer Claiming Kernel-Level Defense Evasion
A threat actor operating under the handle Crypt4You has begun advertising a sophisticated new offensive tool on underground cybercrime forums, marketed as a >>kernel-level>crypters
-
Hackers Impersonated Jackson JSON Library to Infiltrate Maven Central
Security researchers have uncovered a sophisticated multi-stage malware campaign targeting Maven Central, the primary repository for Java dependencies. The attack centered on a malicious package impersonating the legitimate Jackson JSON library marking the first significant detection of advanced malware in an ecosystem that has historically remained resilient against supply chain attacks. The malicious package, published…
-
Hackers Abuse Copilot Studio’s New Connected Agents Feature to Plant Backdoors
Microsoft’s latest innovation may have opened the door to sophisticated cyberattacks. At Build 2025, the company introduced >>Connected Agents,
-
Chinese Hackers Deploy Rootkit to Stealthily Mask ToneShell Malware
Tags: apt, backdoor, china, cyber, cyberespionage, government, group, hacker, malicious, malware, technology, toolA sophisticated cyberespionage campaign leveraging kernel-mode rootkit technology has been discovered targeting government organizations across Southeast and East Asia, with Myanmar and Thailand bearing the brunt of attacks. Security researchers identified a malicious driver delivering the ToneShell backdoor, a hallmark tool of the Chinese-nexus HoneyMyte APT group, also tracked as Mustang Panda or Bronze President.…
-
‘Why should we pay these criminals?’: the hidden world of ransomware negotiations
Cybersecurity experts reveal what they do for high-profile clients targeted by hackers such as Scattered Spider They call it “stopping the bleeding”: the vital window to prevent an entire database from being ransacked by criminals or a production line grinding to a halt.When a call comes into the cybersecurity firm S-RM, headquartered on Whitechapel High…
-
The Most Dangerous People on the Internet in 2025
From Donald Trump to DOGE to Chinese hackers, this year the internet’s chaos caused outsized real-world harm. First seen on wired.com Jump to article: www.wired.com/story/most-dangerous-people-on-the-internet-2025/
-
Wired-Abonnentendatenbank geleakt
Ein Datenleck erschüttert das Magazin Wired. Hacker haben persönliche Informationen von 2,3 Millionen Abonnenten erbeutet und verkaufen diese nun. First seen on golem.de Jump to article: www.golem.de/news/hacker-wired-abonnentendatenbank-geleakt-2512-203646.html
-
Wired-Abonnentendatenbank geleakt
Ein Datenleck erschüttert das Magazin Wired. Hacker haben persönliche Informationen von 2,3 Millionen Abonnenten erbeutet und verkaufen diese nun. First seen on golem.de Jump to article: www.golem.de/news/hacker-wired-abonnentendatenbank-geleakt-2512-203646.html
-
Evasive Panda ändert das DNS, statt Updates lädt man Malware
Die Hacker-Gruppe Evasive Panda nutzte das Domain Name System, um unzählige Computer zu verseuchen. Das DNS ist elementar und keine Beilage. First seen on tarnkappe.info Jump to article: tarnkappe.info/artikel/cyberangriffe/evasive-panda-aendert-das-dns-statt-updates-laedt-man-malware-324673.html
-
Condé Nast faces major data breach: 2.3M WIRED records leaked, 40M more at risk
Hacker claims Condé Nast breach, leaking 2.3M WIRED subscriber records and threatening to expose up to 40M more from other brands. A hacker known as “Lovely” claims to have leaked personal data of over 2.3 million Wired.com users. The data was allegedly posted on December 20, 2025, on the new Breach Stars hacking forum, with…
-
Hacker claims to leak WIRED database with 2.3 million records
A hacker claims to have breached Condé Nast and leaked an alleged WIRED database containing more than 2.3 million subscriber records, while also warning that they plan to release up to 40 million additional records for other Condé Nast properties. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/hacker-claims-to-leak-wired-database-with-23-million-records/
-
Ubisoft: Rainbow-Six-Siege-Server wegen Hack heruntergefahren
Hacker erlangten Zugriff auf die Server von Rainbow Six Siege. Nach Bannwellen und Credit-Regen hat Ubisoft mit einem Systemstopp reagiert. First seen on golem.de Jump to article: www.golem.de/news/ubisoft-rainbow-six-siege-server-wegen-hack-heruntergefahren-2512-203634.html
-
2026 steht im Zeichen des Identity-Hackings
Eine Entspannung der Sicherheitslage im Cyberspace ist auch für 2026 nicht zu erwarten. Ganz im Gegenteil: Es deutet alles darauf hin, dass sich die Bedrohungen zuspitzen werden. Ontinue, der Experte für Managed Extended Detection and Response (MXDR), erklärt die sechs wichtigsten Cybersecurity-Trends für das kommende Jahr. Identitäten avancieren zum Haupteinfallstor für Hacker: Im kommenden… First…

