Tag: hacker
-
Attackers Exploit Zero-Day in End-of-Life D-Link Routers
Hackers are attacking a critical zero-day flaw in unsupported D-Link DSL routers to run arbitrary commands. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/attackers-exploit-zero-day-end-of-life-d-link-routers
-
Deception Tech Snares Shiny Hunter Attacker’s IP Address
Targeted Threat Intel Firm Shares Details With Police After Honeypot Hit Getting owned by deception technology isn’t good news for one’s criminal brand or ability to remain at large. Just ask the band of young hackers behind Scattered Lapsus$ Shiny Hunters, when one of their ilk fell into a security firm’s honeytrap, revealing his actual…
-
Hackers Using Malicious QR Codes for Phishing via HTML Table
Threat actors are continuing to refine “quishing” phishing delivered through QR codes by shifting from traditional image-based payloads to “imageless” QR codes rendered directly in email HTML, a tactic designed to sidestep security tools that focus on decoding QR images. QR code abuse is not new, but it remains effective because the user experience is…
-
Chinese Hackers Launch Ongoing Attacks on Taiwan’s Critical Infrastructure
China’s state-sponsored cyber operations against Taiwan have intensified dramatically, with threat actors launching an average of 2.63 million intrusion attempts daily targeting critical infrastructure across nine primary sectors, according to a newly released report from Taiwan’s National Security Bureau (NSB). The NSB report documents a concerning pattern of synchronized cyber warfare operations that correlate directly…
-
Max severity Ni8mare flaw lets hackers hijack n8n servers
A maximum severity vulnerability dubbed “Ni8mare” allows remote, unauthenticated attackers to take control over locally deployed instances of the N8N workflow automation platform. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/max-severity-ni8mare-flaw-lets-hackers-hijack-n8n-servers/
-
In 2026, Hackers Want AI: Threat Intel on Vibe Hacking & HackGPT
Cybercriminals are increasingly using AI to lower the barrier to entry for fraud and hacking, shifting from skill-based to AI-assisted attacks known as “vibe hacking.” Flare examines how underground forums promote AI tools, jailbreak techniques, and so-called “Hacking-GPT” services that promise ease rather than technical mastery. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/in-2026-hackers-want-ai-threat-intel-on-vibe-hacking-and-hackgpt/
-
Lone Hacker Used Infostealers to Access Data at 50 Global Companies
A Hudson Rock report reveals how an Iranian hacker named Zestix breached 50 global companies, including Iberia Airlines and Pickett Associates, by using stolen passwords and a lack of MFA. First seen on hackread.com Jump to article: hackread.com/lone-hacker-infostealers-global-companies-data/
-
Hackers Claim to Disconnect Brightspeed Customers After Breach
A hacking collective claims it has disconnected customers of US ISP Brightspeed First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/hackers-disconnect-brightspeed/
-
Hackers actively exploit critical RCE flaw in legacy D-Link DSL routers
Attackers are exploiting a critical flaw (CVE-2026-0625) in old D-Link DSL routers that allows remote command execution. Threat actors are actively exploiting a critical RCE flaw, tracked as CVE-2026-0625 (CVSS score of 9.3), in legacy D-Link DSL routers. The vulnerability is an improper neutralization of special elements used in an OS Command (‘OS Command Injection’),…
-
Hackers Exploit Routing Misconfigurations to Successfully Spoof Organizations
Cybercriminals are exploiting complex routing scenarios and misconfigured email authentication protections to successfully spoof organizational domains, enabling them to deliver phishing emails that appear to originate from within targeted companies. The attack vector, which has seen increased activity since May 2025, leverages weaknesses in Domain-based Message Authentication, Reporting, and Conformance (DMARC) configurations and third-party email…
-
Millions of Android Powered TVs and Streaming Devices Infected by Kimwolf Botnet
Synthient discovers over 2 million Android TV boxes and smart TVs hijacked by the Kimwolf botnet. Learn how hackers are using home devices to launch DDoS attacks and how you can protect your home network. First seen on hackread.com Jump to article: hackread.com/android-tv-streaming-devices-infected-kimwolf-botnet/
-
Missing MFA Strikes Again: Hacker Hits Collaboration Tools
Terabytes of Data Stolen From Cloud-Based Collaboration Tools, Researchers Warn. Dozens of organizations that use real-time content collaboration platforms appear to have lost not only credentials but also terabytes of hosted data to information-stealing malware being wielded by an initial access broker with a sideline in auctioning large volumes of stolen data. First seen on…
-
Gratis-Versprechen, teurer Fehler: Hacker kapert über Windows-Aktivierungstool tausende Krypto-Transfers
First seen on t3n.de Jump to article: t3n.de/news/windows-aktivierungstool-infiziert-pc-1724021/
-
Resecurity Went on the Cyber Offensive When ‘Shiny Objects’ trick ‘Shiny Hunters’
Resecurity released 105 pages with 1,000+ messages tied to hacker John Erin Binns, detailing contacts with an unnamed woman in Turkey and an associate called “S.M.” Resecurity released 105 pages containing over 1,000 messages related to John Erin Binns, a hacker who is currently not in U.S. custody, and sent a “warm hello” to an…
-
Fujitsu Post Office IT support team were ‘legalised hackers’
Backdoors meant it was possible for Fujitsu staff to steal money from Post Office branches, says former Fujitsu tech worker First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366636770/Former-Fujitsu-IT-support-team-were-legalised-hackers
-
Malware im Anmarsch: Hacker tricksen Windows-Nutzer mit Fake-Bluescreens aus
Ein Bluescreen, der gleich die Problemlösung mitliefert? Zu schön, um wahr zu sein. Es droht eine gefährliche Malware-Infektion. First seen on golem.de Jump to article: www.golem.de/news/malware-im-anmarsch-hacker-tricksen-windows-nutzer-mit-fake-bluescreens-aus-2601-203847.html
-
Covenant Health Notifying 480K Patients of 2025 Data Theft
Ransomware Gang Qilin Had Claimed It Stole 852 GB of Health System’s Data. Nearly half a million patients of a Catholic healthcare network that serves New England and parts of Pennsylvania began the new year by receiving notifications that hackers may have stolen their health information in a May 2025 hacking incident. First seen on…
-
Russian hackers target European hospitality industry with ‘blue screen of death’ malware
The scheme starts with a fake reservation cancellation that impersonates a popular booking site, and eventually prompts victims with an error message and “Blue Screen of Death” page. First seen on therecord.media Jump to article: therecord.media/russian-hackers-europe-hospitality-blue-screen
-
Hacktivist deletes white supremacist websites live onstage during hacker conference
A hacker known as Martha Root broke in and deleted three white supremacist websites at the end of a talk during the annual hacker conference Chaos Communication Congress in Germany. First seen on techcrunch.com Jump to article: techcrunch.com/2026/01/05/hacktivist-deletes-white-supremacist-websites-live-on-stage-during-hacker-conference/
-
Russia-Aligned Hackers Abuse Viber to Target Ukrainian Military and Government
The Russia-aligned threat actor known as UAC-0184 has been observed targeting Ukrainian military and government entities by leveraging the Viber messaging platform to deliver malicious ZIP archives.”This organization has continued to conduct high-intensity intelligence gathering activities against Ukrainian military and government departments in 2025,” the 360 Threat Intelligence Center said in First seen on thehackernews.com…
-
NordVPN Denies Breach After Hacker Claims Access to Salesforce Dev Data
A hacker using the alias 1011 has claimed to breach a NordVPN development server, posting what appears to… First seen on hackread.com Jump to article: hackread.com/nordvpn-denies-breach-hacker-salesforce-dev-data/
-
Ledger customers impacted by third-party Global-e data breach
Ledger is informing some customers that their personal data has been exposed after hackers breached the systems of third-party payment processor Global-e. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/ledger-customers-impacted-by-third-party-global-e-data-breach/
-
Hackers Steal $35M in Cryptocurrency Following LastPass Breach
Tags: attack, blockchain, breach, crypto, cyber, cybercrime, data-breach, encryption, hacker, intelligence, password, russiaRussian cybercriminals have laundered over $35 million in stolen cryptocurrency linked to the devastating 2022 LastPass breach, according to new forensic analysis by blockchain intelligence firm TRM Labs. The 2022 attack exposed encrypted password vaults belonging to roughly 30 million customers worldwide. While the vaults were initially protected by encryption, attackers who downloaded them could…
-
Cyberangriff geht schief: Berüchtigte Hackergruppe fällt auf Honeypot rein
Hacker hatten es aus Rache auf Resecurity abgesehen. Sie haben jedoch nicht bemerkt, dass sie in eine Falle getappt sind. First seen on golem.de Jump to article: www.golem.de/news/cyberangriff-geht-schief-beruechtigte-hackergruppe-faellt-auf-honeypot-rein-2601-203802.html
-
Quantum Computing Stats, Trends Future 2026: Crucial Year for Quantum Security
The encryption protecting billions of dollars, which experts once called unbreakable, no longer works. Hackers don’t need passwords. They don’t brute-force keys. They simply walk through digital vaults that were supposed to last for decades. This is the future quantum computing is pulling toward us quietly, steadily, and faster than most organizations realize. Quantum computersRead…
-
Hackers claim to hack Resecurity, firm says it was a honeypot
The ShinyHunters hacking group claims it breached the systems of cybersecurity firm Resecurity and stole internal data, while Resecurity says the attackers only accessed a deliberately deployed honeypot containing fake information used to monitor their activity. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/hackers-claim-resecurity-hack-firm-says-it-was-a-honeypot/
-
Hackers claim to hack Resecurity, firm says it was a honeypot
The ShinyHunters hacking group claims it breached the systems of cybersecurity firm Resecurity and stole internal data, while Resecurity says the attackers only accessed a deliberately deployed honeypot containing fake information used to monitor their activity. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/hackers-claim-resecurity-hack-firm-says-it-was-a-honeypot/

