Tag: hacker
-
Sue The Hackers Google Sues Over Phishing as a Service
Google’s Lighthouse lawsuit signals a new era in cybersecurity, where companies use civil litigation”, including the CFAA, Lanham Act, and RICO”, to dismantle phishing networks, seize malicious infrastructure, and fight hackers when criminal prosecution falls short. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/11/sue-the-hackers-google-sues-over-phishing-as-a-service/
-
Sue The Hackers Google Sues Over Phishing as a Service
Google’s Lighthouse lawsuit signals a new era in cybersecurity, where companies use civil litigation”, including the CFAA, Lanham Act, and RICO”, to dismantle phishing networks, seize malicious infrastructure, and fight hackers when criminal prosecution falls short. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/11/sue-the-hackers-google-sues-over-phishing-as-a-service/
-
‘PlushDaemon’ hackers hijack software updates in supply-chain attacks
The China-aligned advanced persistent threat (APT) tracked as ‘PlushDaemon’ is hijacking software update traffic to deliver malicious payloads to its targets. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/plushdaemon-hackers-hijack-software-updates-in-supply-chain-attacks/
-
Eurofiber confirms November 13 hack, data theft, and extortion attempt
Eurofiber says hackers exploited a flaw on November 13, breached its ticket and customer portals, stole data, and attempted extortion. On November 13, threat actors exploited a vulnerability to breach its ticketing system and ATE customer portal of the European fiber operator Eurofiber. Attackers stole data and attempted extortion. Eurofiber focuses on B2B digital infrastructure,…
-
HR’s Role in Preventing Insider Threats: 4 Best Practices
Navigating insider threats is tricky for any company. The IT department might notice increased activity as a hacker attempts to breach databases from the outside, but those inside the organization? They already have access and trust. The post HR’s Role in Preventing Insider Threats: 4 Best Practices appeared first on TechRepublic. First seen on techrepublic.com…
-
Hackers turn open-source AI framework into global cryptojacking operation
Malicious hackers have been attacking the development environment of an open-source AI framework, twisting its functions into a global cryptojacking bot for profit, according to researchers at cybersecurity firm Oligo. The flaw exists in an Application Programming Interface for Ray, an open-source framework for automating, scaling and optimizing compute resources that Oligo researchers called “Kubernetes…
-
Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar
The malware authors associated with a Phishing-as-a-Service (PhaaS) kit known as Sneaky 2FA have incorporated Browser-in-the-Browser (BitB) functionality into their arsenal, underscoring the continued evolution of such offerings and further making it easier for less-skilled threat actors to mount attacks at scale.Push Security, in a report shared with The Hacker News, said it observed the…
-
Energiesektor im Visier von Hackern
Tags: ai, awareness, bsi, cisa, cyber, cyberattack, cybersecurity, data, ddos, defense, detection, germany, hacker, infrastructure, intelligence, Internet, iot, nis-2, password, ransomware, resilience, risk, risk-analysis, risk-management, soc, threat, ukraine, update, usa, vulnerabilityEnergieversorger müssen ihre Systeme vor immer raffinierteren Cyberangriffen schützen.Die Energieversorgung ist das Rückgrat moderner Gesellschaften. Stromnetze, Gaspipelines und digitale Steuerungssysteme bilden die Grundlage für Industrie, Transport und öffentliche Dienstleistungen. Doch mit der zunehmenden Digitalisierung wächst auch die Angriffsfläche. In den vergangenen Jahren ist der Energiesektor verstärkt ins Visier von Cyberkriminellen und staatlich unterstützten Angreifern geraten.…
-
Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks
Suspected espionage-driven threat actors from Iran have been observed deploying backdoors like TWOSTROKE and DEEPROOT as part of continued attacks aimed at aerospace, aviation, and defense industries in the Middle East.The activity has been attributed by Google-owned Mandiant to a threat cluster tracked as UNC1549 (aka Nimbus Manticore or Subtle Snail), which was first documented…
-
The Quantum Future Is Coming Hackers Are Already Preparing
In 2025 we’re not just fighting today’s headline-grabbing cyber threats, but we’re also preparing for tomorrow’s. Technology is evolving at a pace that is both fuelling progress for defenders and powering new tools for bad actors. The same advances that drive discovery and innovation also give cybercriminals new ways to attack faster, more broadly and…
-
Hackers increasingly target operational technology, with manufacturing sector bearing the brunt
Companies should segment and monitor their networks to prevent hackers from crossing over from IT to OT, a new report said. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/operational-technology-cyberattacks-trellix/805693/
-
OT Vulnerabilities Mount But Patching Still a Problem
PLCs Increasingly in Hacker Crosshairs, Warns Trellix. Patching is still the mortal weaknesses of operational technology environments, warns cybersecurity firm Trellix in a report assessing incidents in critical infrastructure settings during the middle two quarters of this year. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/ot-vulnerabilities-mount-but-patching-still-problem-a-30052
-
Sicherheitslücke in V8: Hacker attackieren Chrome-Nutzer über Javascript-Engine
Zur Ausnutzung der Chrome-Lücke reicht der bloße Aufruf einer bösartigen Webseite. Angreifer können daraufhin Schadcode zur Ausführung bringen. First seen on golem.de Jump to article: www.golem.de/news/sicherheitsluecke-in-v8-angreifer-attackieren-chrome-nutzer-ueber-javascript-engine-2511-202288.html
-
UNC1549 Hackers With Custom Tools Attacking Aerospace and Defense Systems to Steal Logins
The Iran-nexus cyber espionage group UNC1549 has significantly expanded its arsenal of custom tools and sophisticated attack techniques in an ongoing campaign targeting aerospace, aviation, and defense industries since mid-2024, according to new findings from Mandiant. The threat actor, which overlaps with Tortoiseshell and has suspected links to Iran’s Islamic Revolutionary Guard Corps (IRGC), demonstrates…
-
Eurofiber France warns of breach after hacker tries to sell customer data
Eurofiber France disclosed a data breach it discovered late last week when hackers gained access to its ticket management system by exploiting a vulnerability and exfiltrated information. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/eurofiber-france-warns-of-breach-after-hacker-tries-to-sell-customer-data/
-
Kamel Ghali on what’s ‘theoretically possible’ in car hacking
White-hat hacker and pentester Kamel Ghali talks with the Click Here podcast team about how cars became computers on wheels, and why, in the race for smarter tech, safety is still trying to catch up. First seen on therecord.media Jump to article: therecord.media/car-hacking-interview-kamel-ghali-click-here-podcast
-
Kenyan gov’t websites back online after hackers deface pages with white supremacist messages
A handful of Kenyan government websites were defaced with white supremacist slogans. First seen on therecord.media Jump to article: therecord.media/kenyan-gov-websites-back-hack
-
Acting on FBI Tip, Thailand Detains Suspected Russian Hacker
Suspect May Be Military Officer Indicted by US for 2016 Election Interference. Police in Thailand have arrested a Russian citizen suspected of launching hack attacks against targets around the world, who’s wanted by the FBI. While the suspect hasn’t been named, his age matches that of a Russian military intelligence officer indicted for 2016 U.S.…
-
A Polycrisis of AI Cyberattacks is Approaching. Are You Breach Ready Yet?
Unless you have been living under a rock in the past few days, you would have seen that cybersecurity headlines have been overshadowed by reports that hackers fooled artificial intelligence agents into automating break-ins into major corporations. Anthropic, the makers of the artificial intelligence (AI) chatbot Claude, claim to run an investigation into how an AI-orchestrated……
-
A Polycrisis of AI Cyberattacks is Approaching. Are You Breach Ready Yet?
Unless you have been living under a rock in the past few days, you would have seen that cybersecurity headlines have been overshadowed by reports that hackers fooled artificial intelligence agents into automating break-ins into major corporations. Anthropic, the makers of the artificial intelligence (AI) chatbot Claude, claim to run an investigation into how an AI-orchestrated……
-
North Korean Hackers Breach 136 U.S. Companies, Earning $2.2 Million
The U.S. Justice Department has announced a significant crackdown on North Korean cybercrime operations, securing five guilty pleas and initiating civil forfeiture actions totaling over $15 million against schemes orchestrated by the Democratic People’s Republic of Korea (DPRK). The elaborate fraud network impacted more than 136 American companies, generating $2.2 million for the North Korean…
-
Hackers Weaponize XWiki Flaw to Build and Rent Out Botnet Networks
Tags: attack, botnet, crypto, cve, cyber, cybersecurity, exploit, flaw, hacker, intelligence, malware, network, threat, vulnerabilityCybersecurity researchers have observed a dramatic escalation in attacks exploiting a critical XWiki vulnerability, with multiple threat actors now leveraging CVE-2025-24893 to deploy botnets, cryptocurrency miners, and custom malware toolkits.”‹ The vulnerability, initially detected by VulnCheck’s Canary Intelligence system on October 28, 2025, has rapidly evolved from a single attacker’s exploit into a widespread multi-actor…
-
Five Plead Guilty in North Korean IT Worker Fraud Scheme
The five defendants allegedly assisted North Korean hackers with obtaining remote IT employment with US companies First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/us-five-plead-guilty-dprk-it/
-
Anthropic: China-backed hackers launch first large-scale autonomous AI cyberattack
China-linked actors used Anthropic’s AI to automate and run cyberattacks in a sophisticated 2025 espionage campaign using advanced agentic tools. China-linked threat actors used Anthropic’s AI to automate and execute cyberattacks in a highly sophisticated espionage campaign in September 2025. The cyber spies leveraged advanced “agentic” capabilities rather than using AI only for guidance. Attackers…
-
ShinyHunters Compromises Legacy Cloud Storage System of Checkout.com
Checkout.com said the notorious ShinyHunters threat group breached a badly decommissioned legacy cloud storage system last used by the company in 2020 and stole some merchant data. The hackers demanded a ransom, but the company instead will give the amount demanded to cybersecurity research groups. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/11/shinyhunters-breaches-legacy-cloud-storage-system-of-checkout-com/
-
Critical CVE-2025-59367 flaw lets hackers access ASUS DSL routers remotely
ASUS fixed a critical auth-bypass flaw (CVE-2025-59367) in DSL routers that let remote, unauthenticated attackers access devices with ease. ASUS patched a critical auth-bypass flaw, tracked as CVE-2025-59367 (CVSS score of 9.3), in multiple DSL routers that allows remote, unauthenticated attackers to easily access unpatched devices. The vulnerability impacts DSL-AC51, DSL-N16, DSL-AC750 router families, the…
-
Chinese state hackers used Anthropic AI systems in dozens of attacks
Artificial intelligence giant Anthropic found that a Chinese espionage group used the company’s AI systems to handle the majority of tasks during cyberattacks on about 30 entities, several of which were successfully breached. First seen on therecord.media Jump to article: therecord.media/chinese-hackers-anthropic-cyberattacks

