Tag: hacker
-
Hackers Launch Over 91,000 Attacks on AI Systems Using Fake Ollama Servers
A new investigation by GreyNoise reveals a massive wave of over 90,000 attacks targeting AI tools like Ollama and OpenAI. Experts warn that hackers are conducting “reconnaissance” to map out vulnerabilities in enterprise AI systems. First seen on hackread.com Jump to article: hackread.com/hackers-attack-ai-systems-fake-ollama-servers/
-
Victorian Department of Education says hackers stole students’ data
The Department of Education in Victoria, Australia, notified parents that attackers gained access to a database containing the personal information of current and former students. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/victorian-department-of-education-notifies-parents-of-data-breach/
-
North Korean Hackers Exploit Code Repositories in “Contagious Interview” Campaign
A newly documented campaign dubbed “Contagious Interview” shows North Korean threat actors weaponising developer tooling and code-repository workflows to steal credentials, cryptocurrency wallets and establish remote access even when victims never “run” the code they are sent. In a recent case analysed by SEAL, a malicious Bitbucket repository (hxxps://bitbucket[.]org/0xmvptechlab/ctrading) was delivered as a take”‘home technical…
-
Hackers Exploit c-ares DLL Side-Loading to Bypass Security and Deploy Malware
Security experts have disclosed details of an active malware campaign that’s exploiting a DLL side-loading vulnerability in a legitimate binary associated with the open-source c-ares library to bypass security controls and deliver a wide range of commodity trojans and stealers.”Attackers achieve evasion by pairing a malicious libcares-2.dll with any signed version of the legitimate ahost.exe…
-
Hackers Use Fake PayPal Notices to Steal Credentials, Deploy RMMs
Phishing attacks have been identified using fake PayPal alerts to exploit remote monitoring and management tools First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/hackers-fake-paypal-notices-deploy/
-
Threat Actor Teases Source Code for Sale After Hack of Target Systems
Hackers posted online what they said were samples of about 860 GB of internal source code, developer documentation, and other data taken from systems of giant U.S. retailer Target and is reportedly offering to sell the stolen information. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/threat-actor-teases-source-code-for-sale-after-hack-of-target-systems/
-
Cancer Center: Hackers Stole Research Files, Encrypted Data
University of Hawaii Cancer Center Paid Ransom. Cancer patients who participated in University of Hawaii Cancer Center studies during the 1990s may soon receive a notification that ransomware hackers stole their data in an August 2025 incident. Experts said the hack spotlights concerning risks involving compromises of medical research data. First seen on govinfosecurity.com Jump…
-
Betterment confirms data breach after wave of crypto scam emails
U.S. digital investment advisor Betterment confirmed that hackers breached its systems and sent fake crypto-related messages to some customers. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/betterment-confirms-data-breach-after-wave-of-crypto-scam-emails/
-
Betterment confirms data breach after wave of crypto scam emails
U.S. digital investment advisor Betterment confirmed that hackers breached its systems and sent fake crypto-related messages to some customers. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/betterment-confirms-data-breach-after-wave-of-crypto-scam-emails/
-
1980s Hacker Manifesto
Forty years ago, The Mentor”, Loyd Blankenship”, published “The Conscience of a Hacker” in Phrack. You bet your ass we’re all alike”¦ we’ve been spoon-fed baby food at school when we hungered for steak”¦ the bits of meat that you did let slip through were pre-chewed and tasteless. We’ve been dominated by sadists, or ignored…
-
Dutch court convicts hacker who exploited port networks for drug trafficking
Dutch appeals court jails a 44-year-old hacker for 7 years for hacking port systems to help smuggle cocaine through European logistics hubs. A Dutch appeals court sentenced a 44-year-old hacker to seven years in prison for hacking port systems to help smuggle cocaine through European logistics hubs into the Netherlands. The appeals court reduced the…
-
Kremlin-linked hackers pose as charities to spy on Ukraine’s military
Victims were prompted to download what appeared to be documents but were, in fact, executable files, often packaged in password-protected archives. First seen on therecord.media Jump to article: therecord.media/kremlin-linked-hackers-pose-as-charities-spy-ukraine
-
Court tosses appeal by hacker who opened port to coke smugglers with malware
Dutchman fails to convince judges his trial was unfair because cops read his encrypted chats First seen on theregister.com Jump to article: www.theregister.com/2026/01/13/dutch_port_hacker_appeal/
-
Court tosses appeal by hacker who opened port to coke smugglers with malware
Dutchman fails to convince judges his trial was unfair because cops read his encrypted chats First seen on theregister.com Jump to article: www.theregister.com/2026/01/13/dutch_port_hacker_appeal/
-
Hackers get hacked, as BreachForums database is leaked
Have you ever stolen data, traded a hacking tool, or just lurked on a dark web forum believing that you are anonymous? First seen on bitdefender.com Jump to article: www.bitdefender.com/en-us/blog/hotforsecurity/hackers-get-hacked-as-breachforums-database-is-leaked
-
Hackers Remotely Took Control of an Apex Legends Player’s Inputs
A critical security vulnerability has emerged in Respawn Entertainment’s popular battle royale title, allowing threat actors to remotely manipulate player inputs without requiring code execution capabilities. Respawn Entertainment, the developer of Apex Legends, has confirmed an active security incident affecting its player base. Malicious actors have discovered a vulnerability that enables them to remotely control…
-
DPRK Hackers Earn $600M Posing as Remote Workers
The landscape of corporate espionage has undergone a fundamental transformation. For decades, security teams focused their efforts on identifying disgruntled employees or negligent contractors the traditional >>insider threat.<< Today, the most dangerous infiltrator is not a rogue staffer but rather a sophisticated operative hired under pretenses, operating as part of an organized, state-sponsored recruitment program.…
-
Top 5 Best Cyber Attack Prevention Methods for Small Businesses With Breach Attack Simulation
Cyber attack prevention for Small businesses very has to get serious about their cybersecurity. Hackers are now actively Performing Targeted cyber attack due to their weak security. In fact, 43 percent of cyberattacks today are aimed at smaller firms. Unfortunately, falling victim to cyberattacks can be devastating. Cyberattacks can cause downtime, damaged reputation, and lost…
-
Hacker gets seven years for breaching Rotterdam and Antwerp ports
The Amsterdam Court of Appeal sentenced a 44-year-old Dutch national to seven years in prison for multiple crimes, including computer hacking and attempted extortion. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/hacker-gets-seven-years-for-breaching-rotterdam-and-antwerp-ports/
-
Russian BlueDelta (Fancy Bear) Uses PDFs to Steal Logins in Just 2 Seconds
New research from Recorded Future reveals how Russian state hackers (BlueDelta) are using fake Microsoft and Google login portals to steal credentials. The campaign involves using legitimate PDF lures from GRC and EcoClimate to trick victims. First seen on hackread.com Jump to article: hackread.com/russian-bluedelta-fancy-bear-pdfs-steal-login/
-
BreachForums Breached, Exposing 324K Cybercriminals
Massive data dump reveals real identities and details of administrators and members of the notorious hacker forum. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/breachforums-breached-exposing-324k-cybercriminals
-
Facebook login thieves now using browserbrowser trick
Hackers over the past six months have relied increasingly more on the browser-in-the-browser (BitB) method to trick users into providing Facebook account credentials. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/facebook-login-thieves-now-using-browser-in-browser-trick/
-
Armenia probes alleged sale of 8 million government records on hacker forum
The dataset, advertised on an underground forum for $2,500, is said to contain about 8 million records linked to official notifications, including communications from police and judicial bodies. First seen on therecord.media Jump to article: therecord.media/armenia-probes-alleged-sale-government-records
-
Target’s dev server offline after hackers claim to steal source code
Hackers are claiming to be selling internal source code belonging to Target Corporation, after publishing what appears to be a sample of stolen code repositories on a public software development platform. After BleepingComputer notified Target, the files were taken offline and the retailer’s developer Git server was inaccessible. First seen on bleepingcomputer.com Jump to article:…
-
Spanish energy giant Endesa discloses data breach affecting customers
Spanish energy provider Endesa and its EnergÃa XXI operator are notifying customers that hackers accessed the company’s systems and accessed contract-related information, which includes personal details. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/spanish-energy-giant-endesa-discloses-data-breach-affecting-customers/
-
Dutch court sentences hacker who used port systems to smuggle cocaine to 7 years
The Amsterdam Court of Appeal ruled Friday that the man played a central technical role in a criminal network that exploited port computer systems in 2020 and 2021, allowing traffickers to move drugs through Europe’s logistics hubs without detection. First seen on therecord.media Jump to article: therecord.media/dutch-court-sentences-hacker-who-smuggled-cocaine-ports
-
ClickFix-Angriffsvariante ConsentFix: So tricksen Hacker Microsoft-Konten aus
Durch diesen Trick erhalten die Angreifer den OAuth-Schlüssel und können eine Verbindung zwischen ihrem eigenen System und dem Microsoft-Konto des Opfers herstellen ohne Passwortdiebstahl oder Umgehung der Multi-Faktor-Authentifizierung. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/clickfix-angriffsvariante-consentfix-so-tricksen-hacker-microsoft-konten-aus/a43332/

