Tag: hacker
-
Massive Rainbow Six Siege breach gives players billions of credits
Ubisoft’s Rainbow Six Siege (R6) suffered a breach that allowed hackers to abuse internal systems to ban and unban players, manipulate in-game moderation feeds, and grant massive amounts of in-game currency and cosmetic items to accounts worldwide. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/massive-rainbow-six-siege-breach-gives-players-billions-of-credits/
-
Hacker Leaks 2.3M Wired.com Records, Claims 40M-User Condé Nast Breach
A hacker using the alias >>Lovely
-
Hackers Compromise Trust Wallet Chrome Extension, Users Claim Millions Stolen
Trust Wallet users suffered devastating losses exceeding $7 million after cybercriminals compromised the Chrome browser extension version 2.68.0, released on December 24, 2025. The breach, which targeted desktop users exclusively, left hundreds of wallets completely drained within hours of the malicious update’s deployment. Blockchain investigator ZachXBT initially flagged the incident on the social media platform…
-
Neuer Rekord: So viel Geld erbeuteten Krypto-Hacker 2025
First seen on t3n.de Jump to article: t3n.de/news/rekord-krypto-hacker-2025-1723034/
-
Best of 2025: Ukraine Pwns Russian Drone Maker, Gaskar is ‘Paralyzed’
Ukrainian Cyber Alliance and Black Owl team up to hack manufacturer of Russian military drones, sources”¯”¯say. Gaskar Group, Russian designer of drones plaguing Ukraine’s skies, is in utter disarray. Or, at least, so says Ukrainian military intelligence. Hacker groups teamed up to steal and delete 57″¯TB of critical data and backups, preventing the company from..…
-
Cyber Experts Warn of Increased Consumer Scams This Festive Season
As Santa starts his travels, experts are warning that his arrival could bring with it a range of cyber risks, from scams to insecure gadgets. Whilst Santa prefers to deliver via chimney, most cybercriminals are looking for backdoors. In some cases, hackers prefer to deliver malicious communications via email. Worryingly, in 2025, scams are not…
-
>>Operation IconCat<<: Hackers Masquerade as Security Giants to Target Israeli Firms
Tags: hackerThe post >>Operation IconCat
-
Red Hat GitLab breach exposes data of 21,000 Nissan customers
Hackers breached Red Hat’s GitLab, stealing data of 21,000 customers; Nissan confirmed exposure via a self-managed GitLab instance. Japanese carmaker Nissan disclosed a data breach tied to a self-managed GitLab instance used by Red Hat Consulting. Threat actors gained access to the GitLab instance, stealing data from 21,000 customers. In October, the Crimson Collective claimed…
-
US insurance giant Aflac says hackers stole personal and health data of 22.6 million people
Aflac, one of the largest insurance companies in the U.S., confirmed hackers stole reams of personal data, including Social Security numbers, identity documents, and health information. First seen on techcrunch.com Jump to article: techcrunch.com/2025/12/23/us-insurance-giant-aflac-says-hackers-stole-personal-and-health-data-of-22-6-million-people/
-
Hackers stole over $2.7B in crypto in 2025, data shows
2025 was another banner year for crypto hacks and heists, the third year in a row that a new crypto theft record was set. First seen on techcrunch.com Jump to article: techcrunch.com/2025/12/23/hackers-stole-over-2-7-billion-in-crypto-in-2025-data-shows/
-
US insurance giant Aflac says hackers stole personal and health data of 22.6 million
Aflac, one of the largest insurance companies in the U.S., confirmed hackers stole reams of personal data, including Social Security numbers, identity documents, and health information. First seen on techcrunch.com Jump to article: techcrunch.com/2025/12/23/us-insurance-giant-aflac-says-hackers-stole-personal-data-of-22-6-million/
-
Amazon has stopped 1,800 job applications from North Korean agents
North Korean group infiltrated 100-plus companies with imposter IT pros: CrowdStrike reportHow not to hire a North Korean IT spyNorth Korean hackers impersonated recruiters to steal credentials from over 1,500 developer systemsNorth Korean fake IT workers up the ante in targeting tech firms First seen on csoonline.com Jump to article: www.csoonline.com/article/4111148/amazon-has-stopped-1800-job-applications-from-north-korean-agents.html
-
Why outsourced cyber defenses create systemic risks
Tags: access, ai, attack, backdoor, breach, business, ciso, cloud, compliance, corporate, cyber, cybercrime, cybersecurity, data, defense, detection, dora, exploit, finance, framework, GDPR, governance, government, hacker, healthcare, infrastructure, law, malicious, monitoring, moveIT, msp, nis-2, ransomware, regulation, resilience, risk, software, strategy, supply-chain, threat, tool, vulnerability, zero-trustRisk categories of outsourced IT & cybersecurity: When you outsource, responsibility shifts, but accountability never leaves you. The risks fall into clear categories. Operational risks The most basic risk is fragile continuity. In 2017, British Airways outsourced parts of its IT operations. A system outage grounded flights worldwide. The vendor contract delivered savings, but it…
-
Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits
Malware peddlers are targeting infosec enthusiasts, budding security professionals, and aspiring hackers with the Webrat malware, masquerading the threat as proof-of-concept … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/12/23/fake-poc-exploits-webrat-malware/
-
Best API Vulnerability Scanner in 2026
APIs (Application Programming Interfaces) have become the digital backbone of modern enterprises, seamlessly linking mobile applications, cloud platforms, and partner ecosystems. As their adoption rapidly progresses, APIs have also emerged as one of the most attractive entry points for hackers, thus signifying the importance of an API Vulnerability Scanner. By 2026, API security will have……
-
Nefilim ransomware hacker pleads guilty to computer fraud
A Ukrainian national pleaded guilty in U.S. federal court to one charge stemming from attacks using Nefilim ransomware on companies in the U.S., Canada and Australia. First seen on therecord.media Jump to article: therecord.media/nefilim-ransomware-hacker-fraud
-
Ukrainian hacker pleads guilty to Nefilim Ransomware attacks in U.S.
Ukrainian Artem Stryzhak (35) pleaded guilty in the U.S. for Nefilim ransomware attacks; he was arrested in Spain in 2024, extradited in April 2025. A 35-year-old Ukrainian, Artem Aleksandrovych Stryzhak (35), pleaded guilty in the U.S. for Nefilim ransomware attacks. The Ukrainian citizen was arrested in Spain in 2024 and extradited to the US in…
-
Hacker-Gruppe Ink Dragon Cyberangriffe werden zur Infrastruktur
Check Point Software Technologies warnt vor der zunehmenden Aktivität der staatlich geprägten Gruppe Ink Dragon, die kompromittierte Systeme nicht nur als Ziel nutzt, sondern sie gezielt in ein verdecktes Relais-Netz einbindet, um weitere Operationen zu steuern und auszubauen. Das wichtigste in Kürze: Ink Dragon ist seit mindestens 2023 aktiv und richtet sich zunehmend gegen Regierungseinrichtungen,…
-
Blind Eagle Hackers Target Government Agencies Using PowerShell Scripts
Tags: access, cyber, cyberattack, cybersecurity, email, government, group, hacker, phishing, powershell, spear-phishing, threatColombian government institutions are facing a sophisticated multi-stage cyberattack campaign orchestrated by the BlindEagle threat group, which leveraged compromised internal email accounts, PowerShell scripts, and steganography to deploy remote access trojans on target systems, according to Zscaler ThreatLabz researchers. The cybersecurity firm discovered the spear-phishing operation in early September 2025, revealing that BlindEagle targeted agencies…
-
Arcane Werewolf Hacker Group Expands Arsenal with Loki 2.1 Malware Toolkit
The cyber espionage group known as Arcane Werewolf (also tracked as Mythic Likho) has significantly upgraded its offensive capabilities, targeting Russian manufacturing enterprises with a new iteration of its custom malware. According to a report by BI.ZONE Threat Intelligence: campaigns observed in October and November 2025 reveal that the group has transitioned from the Loki…
-
Hackers Abuse Popular Monitoring Tool Nezha as a Stealth Trojan
Cybersecurity firm Ontinue reveals how the open-source tool Nezha is being used as a Remote Access Trojan (RAT) to bypass security and control servers globally. First seen on hackread.com Jump to article: hackread.com/hackers-abuse-monitoring-tool-nezha-trojan/
-
Insider Threat: Hackers Paying Company Insiders to Bypass Security
A new report from Check Point Research reveals a growing trend of cyber criminals recruiting employees at banks, telecoms, and tech giants. Learn how hackers use the darknet and Telegram to offer payouts up to $15,000 for internal access to companies like Apple, Coinbase, and the Federal Reserve. First seen on hackread.com Jump to article:…
-
University of Sydney discloses a data breach impacting 27,000 people
Hackers stole personal data of about 27,500 people from the University of Sydney after accessing an online code library, the university confirmed. The University of Sydney disclosed a data breach in which threat actors accessed an online code library and stole personal information linked to about 27,500 individuals, including current and former staff, affiliates, students,…
-
Ukrainian hacker admits affiliate role in Nefilim ransomware gang
A Ukrainian national pleaded guilty on Friday to conducting Nefilim ransomware attacks that targeted high-revenue businesses across the United States and other countries. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/ukrainian-hacker-admits-affiliate-role-in-nefilim-ransomware-gang/
-
Erpressung nach Smishing bei Analytics-Dienstleister – Pornhub meldet Diebstahl von Kundendaten Hacker drohen mit Leak
First seen on security-insider.de Jump to article: www.security-insider.de/pornhub-datenabfluss-mixpanel-shinyhunters-smishing-a-e567d92c5ab31a5c3e1900c16de81073/
-
Top 10 CERT-In Empanelled Auditors in India in 2026
Organisations today are increasingly exposed to cyber risks originating from unchecked network scanning and unpatched vulnerabilities. At the same time, the rise of malicious large language models like WormGPT and FraudGPT has lowered the barrier for hackers, enabling even less-skilled actors to launch phishing campaigns, create malware, and exploit security gaps with alarming ease. For……
-
Hackers Stole Millions of PornHub Users’ Data for Extortion
Plus: Cisco discloses a zero-day with no available patch, Venezuela accuses the US of a cyberattack, and more. First seen on wired.com Jump to article: www.wired.com/story/security-news-this-week-hackers-stole-millions-of-pornhub-users-data-for-extortion/
-
Hackers Stole Millions of PornHub Users’ Data for Extortion
Plus: Cisco discloses a zero-day with no available patch, Venezuela accuses the US of a cyberattack, and more. First seen on wired.com Jump to article: www.wired.com/story/security-news-this-week-hackers-stole-millions-of-pornhub-users-data-for-extortion/

