Tag: hacker
-
DPRK-Linked Hackers Continue Aggressive Crypto Attacks One Year After Bybit Breach
DPRK-linked operators are maintaining a relentless focus on the crypto sector, with activity accelerating rather than slowing in the year since the record-breaking Bybit breach. On 21 February 2025, threat actors linked to North Korea stole around 1.46 billion dollars in cryptoassets from Dubai-based exchange Bybit, in what remains the largest confirmed crypto theft to date. By…
-
Luxury hotel stays for just Euro0.01. Spanish police arrest hacker
Tags: hackerSpanish police arrested a 20-year-old hacker accused of booking luxury hotel rooms worth up to Euro1,000 a night for just one cent before being caught. Spanish police arrested a 20-year-old man in Madrid after allegedly manipulating the online payment system of a travel and hotel booking website to secure luxury hotel stays for just Euro0.01…
-
Hackers Hide Pulsar RAT Inside PNG Images in New NPM Supply Chain Attack
Cybersecurity researchers at Veracode reveal a typosquatting attack that disguises Pulsar RAT as images to bypass Windows security and antivirus programs. First seen on hackread.com Jump to article: hackread.com/hackers-pulsar-rat-png-images-npm-supply-chain-attack/
-
Hochleistungstechnologien Cybersicherheit in der Formel 1
Ein Formel-1-Rennstall steht für innovative Technologie und eine große Öffentlichkeit. Er ist ein mittelständisches Hightech-Unternehmen mit entsprechendem Bedarf an IT-Sicherheit. Hacker sollten nicht das Tempo in Sachen Cyberrisiken bestimmen. Deshalb muss ein Partner für IT-Sicherheit spezifische Gefahren erkennen, analysieren und auf sie reagieren können. So kann ein Team wie Scuderia Ferrari HP Cyberangreifer ausbremsen und……
-
RTL Group: Hacker-Abgriff von Mitarbeiterdaten aus dem Intranet
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/rtl-group-hacker-abgriff-mitarbeiterdaten-intranet
-
Amazon: AI-assisted hacker breached 600 Fortinet firewalls in 5 weeks
Amazon is warning that a Russian-speaking hacker used multiple generative AI services as part of a campaign that breached more than 600 FortiGate firewalls across 55 countries in five weeks. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/amazon-ai-assisted-hacker-breached-600-fortigate-firewalls-in-5-weeks/
-
Amazon: AI-assisted hacker breached 600 FortiGate firewalls in 5 weeks
Amazon is warning that a Russian-speaking hacker used multiple generative AI services as part of a campaign that breached more than 600 FortiGate firewalls across 55 countries in five weeks. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/amazon-ai-assisted-hacker-breached-600-fortigate-firewalls-in-5-weeks/
-
EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Security
With $5.5 trillion in global AI risk exposure and 700,000 U.S. workers needing reskilling, four new AI certifications and Certified CISO v4 help close the gap between AI adoption and workforce readiness.EC-Council, creator of the world-renowned Certified Ethical Hacker (CEH) credential and a global leader in applied cybersecurity education, today launched its Enterprise AI Credential…
-
So ticken KI-Agenten für Cybersicherheit wirklich “‹
Immer mehr Security Operation Centers (SOC) setzen im Kampf gegen Hacker und Downtimes auf die Hilfe künstlicher Intelligenz. KI-Agenten, die wie SOC-Teams miteinander autonom kollaborieren, sind in diesem Zusammenhang die neueste Evolutionsstufe. Ontinue, der führende Experte für Managed Extended Detection and Response (MXDR), wirft einen Blick unter die Haube solcher Multi-Agenten-Systeme. Multi-Agenten-Systeme (MAS), bestehend… First…
-
Spanish police say they have arrested hacker who booked luxury hotel rooms for just one cent
Tags: hackerSpain’s police force has announced that it has arrested a 20-year-old man who they claim managed to book luxury hotel rooms worth up to Euro1,000 a night for just one euro cent. First seen on bitdefender.com Jump to article: www.bitdefender.com/en-us/blog/hotforsecurity/spanish-police-say-they-have-arrested-hacker-who-booked-luxury-hotel-rooms-for-just-one-cent
-
TDL 016 – Speed, Risk, and Responsibility in the Age of AI – Rafael Ramirez
Tags: access, ai, antivirus, automation, awareness, business, ciso, cloud, control, country, cyber, data, defense, detection, dns, firewall, governance, government, hacker, ibm, incident response, intelligence, Internet, law, linkedin, login, mfa, microsoft, network, risk, saas, service, skills, software, startup, strategy, technology, threat, tool, training, update, vulnerability, windows, zero-trustSummary In a recent episode of The Defenders Log, host David Redekop sat down with cyber security expert Rafael Ramirez to navigate the rapidly shifting landscape of AI security. As we move deeper into 2026, the duo explored how artificial intelligence has evolved from simple chatbots into powerful, autonomous “agentic” systems. The Double-Edged Sword of…
-
Romanian hacker faces up to 7 years for breaching Oregon emergency management department
In court on Thursday, Catalin Dragomir pleaded guilty to obtaining information from a protected computer and one count of aggravated identity theft. First seen on therecord.media Jump to article: therecord.media/romanian-hacker-faces-7-years-oregon-breach
-
BeyondTrust RCE flaw now exploited in ransomware attacks
Tags: attack, cisa, cve, cybersecurity, exploit, flaw, hacker, infrastructure, ransomware, rce, remote-code-execution, vulnerabilityHackers are actively exploiting the CVE-2026-1731 vulnerability in the BeyondTrust Remote Support product, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) warns. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/cisa-beyondtrust-rce-flaw-now-exploited-in-ransomware-attacks/
-
Don’t trust TrustConnect: This fake remote support tool only helps hackers
Attackers use a dual-purpose website: The TrustConnect website has realistic marketing language, feature descriptions, and documentation that serves both as a public-facing front to promote the software and as a backend portal for customers who purchase access to the tool’s malicious services.”Cybercriminals are instructed to sign up for a ‘free trial,’ instructed on how to…
-
Hackers breach contractor linked to Ukraine’s central bank collectible coin store
The National Bank of Ukraine announced that attackers may have gained access to users’ personal data, including names, phone numbers, email addresses and delivery addresses, in a recent cyberattack. First seen on therecord.media Jump to article: therecord.media/hackers-breach-ukraine-national-bank-contractor
-
Real-Time Risk Detection with Automated Vulnerability Assessment Tools
The global vulnerability landscape continues to expand rapidly, with thousands of new CVEs published every year. Thus, allowing hackers to weaponize newly disclosed flaws at an instant. Public reporting and threat intelligence analyses consistently show that exploitation often begins within days, and sometimes hours, of disclosure. That reality has fundamentally changed what “vulnerability assessment tools”……
-
Cyberangriff: Hacker will Daten von RTL erbeutet haben
Ein Hacker behauptet, im Besitz persönlicher Daten von über 27.000 Mitarbeitern der RTL Group zu sein. RTL untersucht den Vorfall. First seen on golem.de Jump to article: www.golem.de/news/cyberangriff-hacker-will-daten-von-rtl-erbeutet-haben-2602-205640.html
-
Hackers Exploit Critical BeyondTrust Vulnerability to Deploy VShell and SparkRAT
Hackers are actively exploiting a critical vulnerability in BeyondTrust’s remote support software to deploy the VShell backdoor and SparkRAT remote access trojan, enabling full compromise of exposed systems. The vulnerability, tracked as CVE-2026-1731, is being used in real-world attacks against multiple industries across the U.S., Europe, and Asia-Pacific. BeyondTrust is an identity and access management…
-
10 Passwordless-Optionen für Unternehmen
Um Passwörter hinter sich zu lassen, gibt es bessere Lösungen. Wir zeigen Ihnen zehn. Passwörter sind seit Jahrzehnten der Authentifizierungsstandard für Computersysteme, obwohl sie sich immer wieder aufs Neue als anfällig für diverse Cyberangriffsformen erwiesen haben und kompromittierte Benutzerkonten auf regelmäßiger Basis zum Einfallstor für kriminelle Hacker werden. Ein Mittel für CISOs, um diesem Problem…
-
Smartphone-Kaperung: PromptSpy-Hacker missbrauchen Google-KI
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/smartphone-kaperung-promptspy-hacker-missbrauch-google-ki
-
Your Most Dangerous User Is Not Human: How AI Agents and MCP Servers Broke the Internal API Walled Garden
Highlights The Perimeter is Porous: Modern Agentic AI and the Model Context Protocol (MCP) have effectively turned internal data centers inside out, making the “internal API” security model obsolete. The “Confused Deputy” Risk: Legitimate AI agents act as trusted internal entities but can be exploited to bypass Data Loss Prevention (DLP) policies, as seen in…
-
FBI says ATM ‘jackpotting’ attacks are on the rise, and netting hackers millions in stolen cash
The FBI says hacks that trick ATMs into spitting out cash on demand are rising, with hundreds of attacks in the past year alone netting hackers millions in stolen bills. First seen on techcrunch.com Jump to article: techcrunch.com/2026/02/19/fbi-says-atm-jackpotting-attacks-are-on-the-rise-and-netting-hackers-millions-in-stolen-cash/
-
Threat groups use AI to speed up and scale cyberattacks
A report from Palo Alto Networks finds hackers are increasingly using stolen identities and exploiting critical vulnerabilities within minutes of disclosure. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/threat-groups-ai-speed-scale-cyberattacks/812439/
-
China-Linked Hackers Use Dell RecoverPoint Flaw to Drop GrimBolt Malware
Dell warns of a critical security hole in its RecoverPoint software exploited by hackers. Learn how to protect your data from the CVE-2026-22769 vulnerability and the new GrimBolt malware. First seen on hackread.com Jump to article: hackread.com/china-hackers-dell-recoverpoint-flaw-grimbolt-malware/
-
Bug in widely used VoIP phones allows stealthy network footholds, call interception (CVE-2026-2329)
A critical security vulnerability (CVE-2026-2329) in Grandstream VoIP phones could let hackers remotely take full control of the devices and even intercept calls, Rapid7 … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/19/grandstream-voip-phones-vulnerability-cve-2026-2329/
-
Texas sues TP-Link over Chinese hacking risks, user deception
Texas sued networking giant TP-Link Systems, accusing the company of deceptively marketing its routers as secure while allowing Chinese state-backed hackers to exploit firmware vulnerabilities and access users’ devices. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/texas-sues-tp-link-over-chinese-hacking-risks-user-deception/
-
Hackers target Microsoft Entra accounts in device code vishing attacks
Threat actors are targeting technology, manufacturing, and financial organizations in campaigns that combine device code phishing and voice phishing (vishing) to abuse the OAuth 2.0 Device Authorization flow and compromise Microsoft Entra accounts. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/hackers-target-microsoft-entra-accounts-in-device-code-vishing-attacks/
-
Hackers can turn Grok, Copilot into covert commandcontrol channels, researchers warn
Tags: ai, automation, awareness, cloud, control, detection, framework, governance, hacker, identity, monitoring, network, risk, saas, toolSteps to take: Security leaders should not respond by blocking AI outright, analysts said, but by applying the same governance discipline used for other high-risk SaaS platforms.Varkey recommended starting with a comprehensive inventory of all AI tools in use and establishing a clear policy framework for approving and enabling them.Organizations should also implement AI-specific traffic…
-
Buchungssystem gehackt: Hacker übernachtet für nur einen Cent in Luxushotels
Tags: hackerEin 20-jähriger Spanier soll eine Buchungsplattform gehackt und mehrere Hotels dadurch um Zehntausende Euro betrogen haben. First seen on golem.de Jump to article: www.golem.de/news/buchungssystem-gehackt-hacker-uebernachtet-fuer-nur-einen-cent-in-luxushotels-2602-205592.html
-
Hackers Hide Malware in Emoji-Based Code to Bypass Security Defenses
Hackers are increasingly abusing emoji and other Unicode tricks to hide malicious code, bypass filters, and evade modern security controls, including AI-powered defenses. This emerging technique, known as emoji or Unicode smuggling, turns harmless-looking characters into stealth carriers for commands, data, and exploit payloads. Emoji smuggling is an obfuscation technique in which attackers encode malicious content using…

