Tag: hacker
-
FCC Warns of Hackers Hijacking Radio Equipment For False Alerts
Tags: hackerHackers have been hijacking US radio equipment to broadcast false emergency alerts, prompting FCC warnings First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/fcc-hackers-hijacking-radio/
-
Microsoft Teams Guest Chat Flaw Could Let Hackers Deliver Malware
Security researchers have discovered a critical vulnerability in Microsoft Teams that allows attackers to bypass all Defender for Office 365 protections by inviting users into malicious tenant environments. The flaw exploits a fundamental architectural gap in how Teams handles cross-tenant collaboration and guest access. The vulnerability centers on a critical misunderstanding held by most security…
-
Handala Hacker Group Targets Israeli High-Tech and Aerospace Professionals
A sophisticated cyber intimidation campaign by the Handala hacker group has targeted Israeli high-tech and aerospace professionals, publishing their personal information alongside aggressive, misleading descriptions that falsely label them as criminals. Security researchers monitoring dark web activity discovered the publication, which appears to rely primarily on data scraped from LinkedIn professional profiles. During ongoing dark…
-
ThreatsDay Bulletin: AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks, and 20 More Stories
Hackers have been busy again this week. From fake voice calls and AI-powered malware to huge money-laundering busts and new scams, there’s a lot happening in the cyber world.Criminals are getting creative, using smart tricks to steal data, sound real, and hide in plain sight. But they’re not the only ones moving fast. Governments and…
-
Smashing Security podcast #445: The hack that brought back the zombie apocalypse
America’s airwaves are haunted by zombies again, as we dig into a decade of broadcasters leaving their hardware open to attack, giving hackers the chance to hijack TV shows, blast out fake emergency alerts, and even replace religious sermons with explicit furry podcasts. First seen on grahamcluley.com Jump to article: grahamcluley.com/smashing-security-podcast-445/
-
At least 35,000 impacted by Dartmouth College breach through Oracle EBS campaign
More than 35,000 people across multiple states had information stolen by hackers who attacked Dartmouth College during a campaign against a popular line of software from Oracle. First seen on therecord.media Jump to article: therecord.media/dartmouth-data-breach-thousands
-
How User Education Can Become the Strongest Link in Casino Security
Casino security used to be pretty straightforward. You had cameras watching the floor and security guards watching for suspicious players. These days, things are way more complicated. Casinos deal with hackers, data breaches, and scammers who go after players through their phones and computers. The technology protecting casinos has improved a lot, but there’s still…
-
Thanksgiving holiday weekend kicks off heightened threat environment for security teams
As workers take family time and consumers race for Black Friday discounts, hackers gain an advantage to penetrate vulnerable corporate perimeters. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/thanksgiving-holiday-threat-environment-cyber/806585/
-
Multiple London Councils Responding to Cyberattack
Whether Hackers Stole Data Not Yet Known. Several London city councils said they detected hacker activity on Wednesday night in an incident disrupting their telephone access and that may involve stolen data. The contiguous municipalities of Westminster and Kensington and Chelsea said they are responding to a cybersecurity issue. First seen on govinfosecurity.com Jump to…
-
How User Education Can Become the Strongest Link in Casino Security
Casino security used to be pretty straightforward. You had cameras watching the floor and security guards watching for suspicious players. These days, things are way more complicated. Casinos deal with hackers, data breaches, and scammers who go after players through their phones and computers. The technology protecting casinos has improved a lot, but there’s still…
-
How User Education Can Become the Strongest Link in Casino Security
Casino security used to be pretty straightforward. You had cameras watching the floor and security guards watching for suspicious players. These days, things are way more complicated. Casinos deal with hackers, data breaches, and scammers who go after players through their phones and computers. The technology protecting casinos has improved a lot, but there’s still…
-
Microsoft tightens cloud login process to prevent common attack
Hackers have spent decades exploiting a ubiquitous type of vulnerability. Microsoft is trying to change that. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/microsoft-change-cloud-login-entra-id-xss/806556/
-
Microsoft tightens cloud login process to prevent common attack
Hackers have spent decades exploiting a ubiquitous type of vulnerability. Microsoft is trying to change that. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/microsoft-change-cloud-login-entra-id-xss/806556/
-
Hackers exploit 3D design software to target game developers, animators
Russia-linked hackers are exploiting 3D design tools to infect animators, game developers and visual effects studios with information-stealing malware, according to new research. First seen on therecord.media Jump to article: therecord.media/hackers-blender-software-malware
-
Hackers exploit 3D design software to target game developers, animators
Russia-linked hackers are exploiting 3D design tools to infect animators, game developers and visual effects studios with information-stealing malware, according to new research. First seen on therecord.media Jump to article: therecord.media/hackers-blender-software-malware
-
Municipal emergency warning service offline after hackers steal user data
An emergency warning service used by municipalities across the U.S. was taken down in recent weeks by hackers who also stole information on the system’s users. First seen on therecord.media Jump to article: therecord.media/emergency-warning-service-offline
-
Municipal emergency warning service offline after hackers steal user data
An emergency warning service used by municipalities across the U.S. was taken down in recent weeks by hackers who also stole information on the system’s users. First seen on therecord.media Jump to article: therecord.media/emergency-warning-service-offline
-
Hackers Launch Active Attacks on Telecom and Media Industries
The telecommunications & media sector stands at the epicenter of a relentless cyber onslaught, as evidenced by CYFIRMA’s latest quarterly industry report. Leveraging telemetry-driven intelligence and deep-dive threat research. The report unveils alarming trends in advanced attack campaigns, surging underground chatter, and evolving ransomware dynamics, painting a picture of a sector under siege and in…
-
Hackers Launch Active Attacks on Telecom and Media Industries
The telecommunications & media sector stands at the epicenter of a relentless cyber onslaught, as evidenced by CYFIRMA’s latest quarterly industry report. Leveraging telemetry-driven intelligence and deep-dive threat research. The report unveils alarming trends in advanced attack campaigns, surging underground chatter, and evolving ransomware dynamics, painting a picture of a sector under siege and in…
-
New Malware-as-a-Service ‘Olymp Loader’ Emerges on Hacker Forums With Advanced Anti-Analysis Features
Olymp Loader has emerged as a sophisticated Malware-as-a-Service (MaaS) platform since its public debut in June 2025, quickly establishing itself as a notable threat across underground cybercriminal forums and Telegram channels. Marketed under the alias >>OLYMPO,
-
North Korean Hackers Evade UN Sanctions Through Cyber Operations and Crypto Schemes
The Multilateral Sanctions Monitoring Team (MSMT) has released a comprehensive report documenting systematic violations of UN sanctions by North Korea. Between 2024 and 2025, North Korean cyber operations have achieved unprecedented scale in cryptocurrency theft. In 2024 alone, DPRK-linked actors stole approximately USD 1.19 billion a 50 percent year-on-year increase. Revealing how the Democratic People’s…
-
North Korean Hackers Evade UN Sanctions Through Cyber Operations and Crypto Schemes
The Multilateral Sanctions Monitoring Team (MSMT) has released a comprehensive report documenting systematic violations of UN sanctions by North Korea. Between 2024 and 2025, North Korean cyber operations have achieved unprecedented scale in cryptocurrency theft. In 2024 alone, DPRK-linked actors stole approximately USD 1.19 billion a 50 percent year-on-year increase. Revealing how the Democratic People’s…
-
Hackers Use Fake “Battlefield 6” Hype to Spread Stealers and C2 Malware
The global gaming community is reeling after Bitdefender Labs revealed widespread malware operations exploiting the blockbuster launch of Electronic Arts’ Battlefield 6, a first-person shooter developed by DICE and released in October. As one of the year’s most anticipated titles, Battlefield 6’s immense popularity has become fertile ground for cybercriminals deploying sophisticated stealers and command-and-control…
-
Hackers Use Fake “Battlefield 6” Hype to Spread Stealers and C2 Malware
The global gaming community is reeling after Bitdefender Labs revealed widespread malware operations exploiting the blockbuster launch of Electronic Arts’ Battlefield 6, a first-person shooter developed by DICE and released in October. As one of the year’s most anticipated titles, Battlefield 6’s immense popularity has become fertile ground for cybercriminals deploying sophisticated stealers and command-and-control…
-
Weshalb modernes PAM eindeutig die sicherere Wahl im Vergleich zu klassischem ZTNA ist
Zero-Trust Network Access (ZTNA) soll helfen, perimeterbasierte Risiken zu managen. Ältere Generationen von ZTNA jedoch führen selbst neue Schwachstellen ein ein Fakt, der während der letzten DEF CON Hacker-Konferenz im August hervorgehoben wurde. Sicherheitsforscher deckten mehrere kritische Schwachstellen in beliebten ZTNA-Produkten auf und zeigten, wie Angreifer nahezu unbemerkt Berechtigungen auf Endpunkten ausweiten oder auf… First…
-
Weshalb modernes PAM eindeutig die sicherere Wahl im Vergleich zu klassischem ZTNA ist
Zero-Trust Network Access (ZTNA) soll helfen, perimeterbasierte Risiken zu managen. Ältere Generationen von ZTNA jedoch führen selbst neue Schwachstellen ein ein Fakt, der während der letzten DEF CON Hacker-Konferenz im August hervorgehoben wurde. Sicherheitsforscher deckten mehrere kritische Schwachstellen in beliebten ZTNA-Produkten auf und zeigten, wie Angreifer nahezu unbemerkt Berechtigungen auf Endpunkten ausweiten oder auf… First…
-
Underground AI models promise to be hackers ‘cyber pentesting waifu’
Tier-based subscriptions, hacker specific training datasets and playful personalities are part of a growing underground criminal market for custom AI hacking tools. First seen on cyberscoop.com Jump to article: cyberscoop.com/malicious-llm-tools-cybercrime-wormgpt-kawaiigpt/
-
Russia-aligned hackers target US company in attack linked to Ukraine war effort
A threat group called RomCom has a history of cyberattacks against entities connected to the conflict. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/russia-hackers-us-company-attack-ukraine-war/806423/

