Tag: hacking
-
Global crackdown hits pro-Russian cybercrime, 100+ systems taken down worldwide
In a major blow to pro-Russian cybercrime, authorities across Europe and the United States launched a sweeping international crackdown on the hacking group NoName057(16) … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/07/16/pro-russian-cybercrime-crackdown-noname05716/
-
Salt Typhoon hacked the US National Guard for 9 months, and accessed networks in every state
Tags: access, attack, best-practice, breach, credentials, cve, cyber, cybersecurity, data, defense, exploit, government, group, hacking, infrastructure, Internet, malicious, military, network, service, theft, threat, vulnerabilitySensitive military data stolen: The attackers gained access to highly sensitive military and infrastructure information during the nine-month intrusion. The memo stated that “in 2024, Salt Typhoon used its access to a US state’s Army National Guard network to exfiltrate administrator credentials, network traffic diagrams, a map of geographic locations throughout the state, and PII…
-
21-year-old former US soldier pleads guilty to hacking, extorting telecoms
Cameron John Wagenius faces up to 27 years in prison after pleading guilty to wire fraud, extortion and aggravated identity theft in data breaches involving major corporations. First seen on therecord.media Jump to article: therecord.media/cameron-john-wagenius-former-us-soldier-guilty-plea-hacking
-
Ex US Soldier Cameron Wagenius Guilty in Telecom Hacking and Extortion
Former US Army soldier Cameron Wagenius pleads guilty to hacking telecom companies and extorting $1 million+ using cybercrime forums like BreachForums and XSS. First seen on hackread.com Jump to article: hackread.com/us-soldier-cameron-wagenius-guilty-telecom-hacking-extortion/
-
Former US Army member confesses to Telecom hack and extortion conspiracy
A former US Army soldier pleaded guilty to hacking telecom databases, stealing data, and extorting companies by threatening to release the stolen info. A former Army soldier, Cameron John Wagenius (21) pleaded guilty to conspiring to hack telecom companies’ databases, steal sensitive records, and extort victims by threatening to release stolen data unless ransoms were…
-
Co-op Aims to Divert More Young Hackers into Cyber Careers
The Co-op is teaming up with The Hacking Games to inspire pathways into ethical cybersecurity careers First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/coop-divert-young-hackers-cyber/
-
Former U.S. Army Member Pleads Guilty in Telecom Hacking Case
A 21-year-old former U.S. Army soldier has pleaded guilty to participating in a sophisticated cybercrime operation that targeted telecommunications companies through hacking, data theft, and extortion schemes. Cameron John Wagenius, who was stationed in Texas during his military service, admitted to conspiring with others to breach protected computer networks and demand ransom payments from victim…
-
US Army soldier pleads guilty to hacking telcos and extortion
Cameron Wagenius had already pleaded guilty to other charges earlier this year. First seen on techcrunch.com Jump to article: techcrunch.com/2025/07/15/us-army-soldier-pleads-guilty-to-hacking-telcos-and-extortion/
-
Ex-US soldier who Googled ‘can hacking be treason’ pleads guilty to extortion
File this one under what not to search if you’ve committed a crime First seen on theregister.com Jump to article: www.theregister.com/2025/07/15/solider_hacking_guilty/
-
NSA: Volt Typhoon was ‘not successful’ at persisting in critical infrastructure
“The good news” is that China’s Volt Typhoon hacking campaign “really failed,” an NSA official said at a cyber conference in New York. An FBI official also described an incident of “true cyberwarfare” with the Flax Typhoon group. First seen on therecord.media Jump to article: therecord.media/china-typhoon-hackers-nsa-fbi-response
-
Trump administration to spend $1 billion on ‘offensive’ hacking operations
A top Democrat criticized the move to spend a billion on offensive hacking operations as the budget guts a billion from U.S. cyber defense. First seen on techcrunch.com Jump to article: techcrunch.com/2025/07/14/trump-administration-to-spend-1-billion-on-offensive-hacking-operations/
-
PerfektBlue Bug Chain Exposes Cars to Bluetooth Hacking
Bluetooth Flaws in Car Software Could Enable Hijacking of Infotainment Systems. A set of critical Bluetooth flaws in software that helps cars connect to phones and other devices could enable attackers to remotely take control of car infotainment systems used by major automakers including Mercedes-Benz, Skoda and Volkswagen, new research shows. First seen on govinfosecurity.com…
-
Experts uncover critical flaws in Kigen eSIM technology affecting billions
Experts devised a new hack targeting Kigen eSIM tech, used in over 2B devices, exposing smartphones and IoT users to serious security risks. Researchers at Security Explorations uncovered a new hacking method exploiting flaws in Kigen’s eSIM tech, affecting billions of IoT devices. An eSIM (embedded SIM) is a digital version of a traditional SIM…
-
Putting AI-assisted ‘vibe hacking’ to the test
Tags: access, ai, attack, chatgpt, cyber, cybercrime, cybersecurity, data-breach, defense, exploit, hacking, least-privilege, LLM, network, open-source, strategy, threat, tool, vulnerability, zero-trustUnderwhelming results: For each LLM test, the researchers repeated each task prompt five times to account for variability in responses. For exploit development tasks, models that failed the first task were not allowed to progress to the second, more complex one. The team tested 16 open-source models from Hugging Face that claimed to have been…
-
Threats Actors Use Sophisticated Hacking Tools to Destroy Organizations Critical Infrastructure
Threat actors, ranging from state-sponsored organizations to non-state actors, are using sophisticated cyber weapons to breach and destroy vital infrastructure in a time when digital and physical security are becoming more intertwined. These tools, often manifesting as malware agents like worms, viruses, and advanced persistent threats (APTs), exploit vulnerabilities in supervisory control and data acquisition…
-
eSIM Vulnerability in Kigen’s eUICC Cards Exposes Billions of IoT Devices to Malicious Attacks
Cybersecurity researchers have discovered a new hacking technique that exploits weaknesses in the eSIM technology used in modern smartphones, exposing users to severe risks.The issues impact the Kigen eUICC card. According to the Irish company’s website, more than two billion SIMs in IoT devices have been enabled as of December 2020.The findings come from Security…
-
4 Arrested Over Scattered Spider Hacking Spree
Plus: An “explosion” of AI-generated child abuse images is taking over the web, a Russian professional basketball player is arrested on ransomware charges, and more. First seen on wired.com Jump to article: www.wired.com/story/4-arrested-over-scattered-spider-hacking-spree/
-
Leaked Shellter Elite Tool Now Fueling Infostealer Attacks Worldwide
A new report details how the advanced hacking tool Shellter Elite was leaked and is now being used… First seen on hackread.com Jump to article: hackread.com/leaked-shellter-elite-tool-infostealer-attacks-worldwide/
-
Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
An Iranian-backed ransomware-as-a-service (RaaS) named Pay2Key has resurfaced in the wake of the Israel-Iran-U.S. conflict last month, offering bigger payouts to cybercriminals who launch attacks against Israel and the U.S.The financially motivated scheme, now operating under the moniker Pay2Key.I2P, is assessed to be linked to a hacking group tracked as Fox Kitten (aka Lemon Sandstorm).”…
-
PerfektBlue Bluetooth attack allows hacking infotainment systems of Mercedes, Volkswagen, and Skoda
Researchers found critical PerfektBlue flaws in OpenSynergy BlueSDK, allowing remote code execution to hack millions of vehicles’ systems. Researchers at PCA Cyber Security identified a set of critical vulnerabilities, collectively tracked as PerfektBlue, in OpenSynergy BlueSDK Bluetooth stack. The exploitation of the flaws potentially allows remote code execution in millions of vehicles. These flaws could…
-
Vibe Hacking Not Yet Possible
AI Models Mostly Fail in Full Track of Vulnerability Research to Exploit. The rise of code-illiterate but AI-enabled script kiddies able to wreak havoc by weaponizing software vulnerabilities into automated exploits, thanks to expert-level assistance from large language models, remains but a future possibility, based on exploit-writing tests of 50 LLMs. First seen on govinfosecurity.com…
-
US Sanctions Key Threat Actors Tied to North Korea’s Remote IT Worker Scheme
The Office of Foreign Assets Control (OFAC) of the U.S. Department of the Treasury has taken a strong stance against cyber-enabled financial schemes that support North Korea’s illicit weapons programs by imposing sanctions on Song Kum Hyok, a malevolent cyber actor connected to the hacking group Andariel of the Democratic People’s Republic of Korea (DPRK).…
-
4 Arrests in Dawn Raid of Scattered-Spider Suspects
Tags: hackingAlleged arachnid arrests: Three teenage males and a young woman hauled away by cops, suspected of hacking huge retailers. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/07/arrests-scattered-spider-richixbw/
-
Forescout Vedere Labs shows >>vibe hacking<< isn't quite the threat it's made out to be… yet
Forescout’s Vedere Labs has published new research examining the real-world threat posed by generative AI in cyberattacks. While public concern is growing around >>vibe hacking>>, a term describing AI-driven, autonomous hacking, the research findings suggest the threat remains in its early stages. Based on more than 50 simulations involving generative AI models, researchers concluded that…
-
Russia, hotbed of cybercrime, says nyet to ethical hacking bill
Politicians uneasy over potential impact on national security, local reports say First seen on theregister.com Jump to article: www.theregister.com/2025/07/10/russia_ethical_hacking_bill/
-
Authorities arrest four hackers linked to UK retail hacking spree
The U.K. National Crime Agency said the suspects are in custody in relation to the hacks targeting Marks Spencer, Harrods, and the Co-op. First seen on techcrunch.com Jump to article: techcrunch.com/2025/07/10/authorities-arrest-four-hackers-linked-to-uk-retail-hacking-spree/
-
Treasury sanctions North Korean over IT worker malware scheme
The U.S. Department of the Treasury sanctioned cyber actor Song Kum Hyok for his association with North Korea’s hacking group Andariel and for facilitating IT worker schemes that generated revenue for the Pyongyang regime. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/legal/treasury-sanctions-north-korean-over-it-worker-malware-scheme/
-
U.S. Sanctions North Korean Andariel Hacker Behind Fraudulent IT Worker Scheme
The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) on Tuesday sanctioned a member of a North Korean hacking group called Andariel for their role in the infamous remote information technology (IT) worker scheme.The Treasury said Song Kum Hyok, a 38-year-old North Korean national with an address in the Chinese province of…
-
Suspected contractor for China’s Hafnium group arrested in Italy
U.S. authorities charged the man and a co-conspirator with hacking COVID-19 researchers and kicking off a cyberattack spree targeting Microsoft Exchange servers.; First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/suspected-contractor-for-chinas-hafnium-group-arrested-in-italy/752533/

