Tag: hacking
-
Why we must reform the Computer Misuse Act: A cyber pro speaks out
by
in SecurityNewsBritain’s outdated hacking laws are leaving the UK’s cyber practitioners hamstrung and afraid. Security professional Simon Whittaker reveals how he nearly ran afoul of the Computer Misuse Act, and why he’s speaking out for reform First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366623789/Why-we-must-reform-the-Computer-Misuse-Act-A-cyber-pro-speaks-out
-
Russian military cadet reportedly arrested for selling hacking tool to FSB agent
by
in SecurityNewsA Russian military cadet reportedly developed an algorithm that could bypass the protective infrastructure of law enforcement software and gain access to restricted data. First seen on therecord.media Jump to article: therecord.media/russian-military-cadet-reportedly-arrested-for-selling-hacking-tool
-
FBI and Dutch police seize and shut down botnet of hacked routers
by
in SecurityNewsU.S. authorities indicted three Russians and one Kazakhstan national for hacking and selling access to a botnet made of vulnerable internet-connected devices. First seen on techcrunch.com Jump to article: techcrunch.com/2025/05/09/fbi-and-dutch-police-seize-and-shut-down-botnet-of-hacked-routers/
-
BSidesLV24 Hacking Trust Establishment
by
in SecurityNewsAuthor/Presenter: Carrie Randolph Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/05/bsideslv24-hacking-trust-establishment/
-
Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
by
in SecurityNewsA China-linked unnamed threat actor dubbed Chaya_004 has been observed exploiting a recently disclosed security flaw in SAP NetWeaver.Forescout Vedere Labs, in a report published today, said it uncovered a malicious infrastructure likely associated with the hacking group weaponizing CVE-2025-31324 (CVSS score: 10.0) since April 29, 2025.CVE-2025-31324 refers to a critical SAP NetWeaver flaw First…
-
Shaping tomorrow’s cyber defenders: Why the Hacking Games gives me hope for Generations Z, A and beyond
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/perspective/shaping-tomorrows-cyber-defenders-why-the-hacking-games-gives-me-hope-for-generations-z-a-and-beyond
-
Google links new LostKeys data theft malware to Russian cyberspies
by
in SecurityNewsSince the start of the year, the Russian state-backed ColdRiver hacking group has been using new LostKeys malware to steal files in espionage attacks targeting Western governments, journalists, think tanks, and non-governmental organizations. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/google-links-new-lostkeys-data-theft-malware-to-russian-cyberspies/
-
Hacker Exploits AI Art Tool to Steal 1.1TB of Disney Data
by
in SecurityNewsCalifornia Man Pleads Guilty to Two Felony Charges Related to Hacking Employee’s PC. A California man agreed to plead guilty to hacking a Disney employee’s personal computer and stealing over one terabyte of confidential company data. Authorities say the man posted a malicious artificial intelligence art application online and used it to steal an employee’s…
-
Smart Strategies for NHI Deployment
by
in SecurityNewsWhy Does NHI Management Matter in Today’s Cybersecurity Landscape? Data breaches, hacking and cyber threats are at an all-time high, making cybersecurity a crucial priority for businesses. So, how can organizations effectively secure their digital assets and eliminate potential risks? The answer lies in smart NHI strategies and efficient deployment. But what does this mean,……
-
Jury orders NSO to pay $167 million for hacking WhatsApp users
by
in SecurityNewsThe verdict is a major victory for opponents of exploit sellers. First seen on arstechnica.com Jump to article: arstechnica.com/security/2025/05/jury-orders-nso-to-pay-167-million-for-hacking-whatsapp-users/
-
TeleMessage Goes Dark After Trump Adviser Photo Fallout
by
in SecurityNewsHacker Breaches Government-Approved Messaging App Used by Top Trump Officials. A Signal clone messaging app apparently being used by top advisers to U.S. President Donald Trump abruptly went dark Monday following a reported hacking incident. TeleMessage said it temporarily suspended messaging services out of an abundance of caution. First seen on govinfosecurity.com Jump to article:…
-
Hacking of Signal-like app used by Trump officials reported
by
in SecurityNews
Tags: hackingFirst seen on scworld.com Jump to article: www.scworld.com/brief/hacking-of-signal-like-app-used-by-trump-officials-reported
-
Azerbaijan blames Russian state hackers for cyberattacks on local media
by
in SecurityNewsThe Kremlin-backed hacking group known as APT29 was responsible for a February cyberattack on local media, said Azerbaijan’s government, which has moved to reduce Russian influence recently. First seen on therecord.media Jump to article: therecord.media/azerbaijan-blames-media-cyberattacks-russia-apt29
-
California Man Will Plead Guilty to Last Year’s Disney Hack
by
in SecurityNewsA 25-year-old California man will plead guilty to hacking into a Disney’s personal computer and using stolen credentials to break into thousands of Disney Slack channels. Ryan Mitchell Kramer, who claimed to be a member of the Russian group NullBulge, then leaked the data when the victim didn’t respond to his emails. First seen on…
-
Luna Moth Hackers Use Fake Helpdesk Domains to Target Victims
by
in SecurityNewsA recent investigation by cybersecurity firm EclecticIQ, in collaboration with threat hunters, has exposed a surge in malicious activity tied to the Luna Moth hacking group. The actors are now leveragingfake helpdesk-themed domainsto impersonate legitimate businesses and steal sensitive data. This campaign, first detected in March 2025, primarily targets law firms and corporate entities. How…
-
Rhysida Ransomware gang claims the hack of the Government of Peru
by
in SecurityNewsThe Rhysida Ransomware gang claims the hack of the Government of Peru, the gang breached Gob.pe, the Single Digital Platform of the Peruvian State. The Rhysida ransomware gang claims responsibility for hacking the Government of Peru, breaching Gob.pe, which is the country’s official digital platform. The group published the images of multiple documents allegedly stolen…
-
Hacking Spree Hits UK Retail Giants
by
in SecurityNewsPlus: France blames Russia for a series of cyberattacks, the US is taking steps to crack down on a gray market allegedly used by scammers, and Microsoft pushes the password one step closer to death. First seen on wired.com Jump to article: www.wired.com/story/hacking-spree-hits-uk-retail-giants/
-
US Indicts Black Kingdom Hacker for Exchange Hacking Tear
by
in SecurityNewsSuspected Hacker, Rami Khaled Ahmed, 36, Thought to Be in Yemen. A Yemini man faces charges in U.S. federal court for being the mastermind behind a rash of ransomware attacks that took advantage of the 2021 Microsoft Exchange flaw known as ProxyLogon. A Los Angeles federal grand jury indicted Rami Khaled Ahmed, 36. First seen…
-
Despite Arrests, Scattered Spider Continues High-Profile Hacking
by
in SecurityNewsWhile law enforcement has identified and arrested several alleged members, the notorious threat group continues to wreak havoc. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/despite-arrests-scattered-spider-continues-hacking
-
Ascension Notifying Patients About Rash of Third-Party Hacks
by
in SecurityNews4 Breaches Appear to Potentially Affect Hundreds of Thousands Across Several States. Catholic hospital chain Ascension Health is notifying hundreds of thousands of individuals across several states of at least four hacking incidents in recent months involving third-parties. Ascension reported one of the breaches this week, another in mid-April and the others in March and…
-
Preparing for Cyber Warfare CISO’s Defense Resource Guide
by
in SecurityNewsIn the digital age, preparing for cyber warfare is essential as organizations face unprecedented threats beyond traditional hacking and data breaches. Cyber warfare-where attacks are orchestrated by nation-states or highly organized groups-can cripple critical infrastructure, disrupt business operations, and erode trust in institutions. As these threats become more sophisticated and persistent, the Chief Information Security…
-
Tesla Model 3 VCSEC Vulnerability Lets Hackers Run Arbitrary Code
by
in SecurityNewsA high security flaw in Tesla’s Model 3 vehicles, disclosed at the 2025 Pwn2Own hacking competition, allows attackers to execute malicious code remotely via the vehicle’s Tire Pressure Monitoring System (TPMS). The vulnerability, now patched, highlights growing risks in automotive cybersecurity. Detail Description CVE ID CVE-2025-2082 CVSS Score 7.5 (High) Adjacent Network Attack Vector […]…
-
The 14 most valuable cybersecurity certifications
by
in SecurityNews
Tags: access, ai, application-security, attack, automation, best-practice, blockchain, blueteam, china, cisa, cisco, ciso, cloud, compliance, computer, computing, conference, control, country, credentials, cryptography, cyber, cybersecurity, data, defense, encryption, endpoint, exploit, finance, governance, government, guide, hacker, hacking, incident response, intelligence, Internet, jobs, kali, law, linux, malware, metric, microsoft, monitoring, network, penetration-testing, privacy, reverse-engineering, risk, risk-analysis, risk-management, skills, threat, training, vulnerability, windowsIndustry recognition Who’s to say one certification is more respected than another? Such criteria can be very subjective, so we turned to the most direct and unbiased source to cut through the ambiguity: job listings. In addition to education, skills, and qualifications, employers often specify certs they seek in their ideal candidate. These mentions carry…
-
How ‘native English’ Scattered Spider group linked to M&S attack operate
by
in SecurityNewsCybersecurity expert says group are ‘unusual but potently threatening’ coalition of ransomware hackersIf there is one noticeable difference between some members of the Scattered Spider hacking community and their ransomware peers, it will be the accent.Scattered Spider has been linked to a <a href=”https://www.theguardian.com/business/2025/apr/29/m-and-s-cyber-attack-linked-to-hacking-group-scattered-spider”>cyber-attack on UK retailer Marks & Spencer. But unlike other <a href=”https://www.theguardian.com/business/2023/jan/13/what-is-lockbit-ransomware-and-how-does-it-operate-malware-royal-mail”>ransomware…
-
Smashing Security podcast #415: Hacking hijinks at the hospital, and WASPI scams
by
in SecurityNewsHe’s not a pop star, but Jeffrey Bowie is alleged to have toured staff areas of a hospital in Oklahoma, hunting for computers he could install spyware on. We dive into the bizarre case of the man accused of hacking medical networks and then sharing how he did it on LinkedIn. First seen on grahamcluley.com…
-
Russian APT28 hackers have redoubled efforts during Ukraine war, says French security agency
by
in SecurityNews
Tags: apt, attack, backdoor, cisco, credentials, crowdstrike, cyber, detection, exploit, finance, government, group, hacker, hacking, infrastructure, intelligence, Internet, mail, malicious, military, monitoring, network, phishing, russia, service, theft, ukraine, vpn, vulnerabilityTargeting and Compromise of French Entities Using the APT28 Intrusion Set, the group now aggressively targets the networks of government organizations and companies connected to Ukraine’s allies, including France.Since 2021, the group has targeted specific industrial sectors including aerospace, financial services, think tanks and research, local government, and government ministries.Nothing APT28 does stands out as…
-
BSidesLV24 Ground Truth Hacking Things That Think
by
in SecurityNewsAuthor/Presenter: Matthew Canham Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/04/bsideslv24-ground-truth-hacking-things-that-think/
-
From TV5Monde to Govt: France Blames Russia’s APT28 for Cyberattacks
by
in SecurityNewsFrance accuses Russia’s APT28 hacking group (Fancy Bear) of targeting French government entities in a cyber espionage campaign…. First seen on hackread.com Jump to article: hackread.com/tv5monde-govt-france-russia-apt28-cyberattacks/
-
France ties Russian APT28 hackers to 12 cyberattacks on French orgs
by
in SecurityNewsToday, the French foreign ministry blamed the APT28 hacking group linked to Russia’s military intelligence service (GRU) for targeting or breaching a dozen French entities over the last four years. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/france-ties-russian-apt28-hackers-to-12-cyberattacks-on-french-orgs/