Tag: hacking
-
Microsoft Uncovers Sandworm Subgroup’s Global Cyber Attacks Spanning 15+ Countries
A subgroup within the infamous Russian state-sponsored hacking group known as Sandworm has been attributed to a multi-year initial access operation dubbed BadPilot that stretched across the globe.”This subgroup has conducted globally diverse compromises of Internet-facing infrastructure to enable Seashell Blizzard to persist on high-value targets and support tailored network operations,” the First seen on…
-
Getting the Most Value out of the OSCP: Pre-Course Prep
Tags: access, antivirus, attack, compliance, control, credentials, cyber, cybersecurity, detection, exploit, finance, framework, guide, hacker, hacking, infosec, infrastructure, jobs, kali, linux, mandiant, metric, microsoft, mitre, network, organized, password, penetration-testing, PurpleTeam, RedTeam, risk, service, skills, software, tactics, technology, tool, training, vulnerability, windowsThe first post in a five-part practical guide series on maximizing the professional, educational, and financial value of the OffSec certification pursuit for a successful career in offensive cybersecurity consulting Disclaimer: All opinions expressed in this article are solely my own. I have reviewed the content to ensure compliance with OffSec’s copyright policies and agreements.…
-
Sandworm APT Hackers Weaponize Microsoft KMS Activation Tools To Compromise Windows
In a sophisticated cyber-espionage operation, the Russian state-sponsored hacking group Sandworm (APT44), linked to the GRU (Russia’s Main Intelligence Directorate), has been exploiting pirated Microsoft Key Management Service (KMS) activation tools to target Ukrainian Windows users. The campaign, which began in late 2023, leverages trojanized KMS activators and fake Windows updates to deploy malware, including…
-
UK monitoring group to classify cyber incidents on earthquake-like scale
Risk management: The CMC hopes this increased understanding will spur the development of improved incident response planning. Experts quizzed by CSO on CMC welcomed its launch.Ivan Milenkovich, vice president of cyber risk technology in EMEA at Qualys, said data from the CMC has the potential to allow IT security professionals to make better risk assessments,…
-
Cybercrime Threatens National Security, Google Threat Intel Team Says
On the eve of the Munich Security Conference, Google argues that the cybercriminal threat should be treated as a national security threat like state-backed hacking groups. The post Cybercrime Threatens National Security, Google Threat Intel Team Says appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/cybercrime-threatens-national-security-google-threat-intel-team-says/
-
Alabama Hacker Admits Role in SEC X Account Breach
An Alabama man has admitted hacking into the US Security and Exchange Commission’s X account using SIM swap fraud to gain access First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/alabama-hacker-admits-role-sec-x/
-
New Chinese Hacking Campaign Targets Manufacturing Firms to Steal IP
Chinese hackers are infiltrating the networks of suppliers of “sensitive” manufacturers, according to a Check Point report to be published in the coming weeks First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/new-chinese-hacking-ip-theft/
-
Alabama Man Pleads Guilty to Hacking SEC’s X Account
Tags: hackingEric Council Jr. pleaded guilty to hacking the X (formerly Twitter) account of the US Securities and Exchange Commission. The post Alabama Man Pleads Guilty to Hacking SEC’s X Account appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/alabama-man-pleads-guilty-to-hacking-secs-x-account/
-
Evil Crow RF Tool Transforms Smartphones into Powerful RF Hacking Devices
Innovative tools are continually appearing to enhance the capabilities of professionals and enthusiasts alike. One new entrant into the world of radio frequency (RF) tools is the Evil Crow RF V2, a compact device that transforms your smartphone into a powerful tool for RF analysis and penetration testing. With its portable design, user-friendly features, and a…
-
Revelations of Israeli spyware abuse raise fears over possible use by Trump
After WhatsApp claimed 90 users were targeted last year, experts concerned over how US could use cyberweaponsEven as WhatsApp <a href=”https://www.theguardian.com/technology/2024/dec/20/whatsapp-pegasus-spyware-nso-group-hacking”>celebrated a major legal victory in December against NSO Group, the Israeli maker of one of the world’s most powerful cyberweapons, <a href=”https://www.theguardian.com/technology/2025/jan/31/whatsapp-israel-spyware”> a new threat was detected, this time involving another Israel-based company that…
-
Indiana Man Sentenced to 20 Years in Prison for Hacking, $37 Million Crypto Theft
Evan Light was sentenced to 20 years in federal prison for hacking an investment holdings company and stealing $37 million in cryptocurrency. The post Indiana Man Sentenced to 20 Years in Prison for Hacking, $37 Million Crypto Theft appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/indiana-man-sentenced-to-20-years-in-prison-for-hacking-37-million-crypto-theft/
-
Judge says US Treasury ‘more vulnerable to hacking’ since Trump let the DOGE out
Order requires destruction of departmental data accessed by Musky men First seen on theregister.com Jump to article: www.theregister.com/2025/02/10/doge_infosec_impact_court_order/
-
Catholic Hospital Chain: 2023 Hack Affected Nearly 900,000
Midwest Chain Also Faces Multiple Federal Data Privacy Lawsuits. A Midwest chain of doctor practices and 13 Catholic hospitals has reported that a 2023 hacking incident that disrupted its IT system for several days and may have compromised the sensitive data of nearly 900,000 people. The group is also facing an assortment of data privacy…
-
The Explosion of Hardware-Hacking Devices
Due to the growing popularity of the ESP32 IoT platform adoption by security professionals, this article raises several security concerns addressing firmware attacks that could target this user population and what you can do to protect yourself. Introduced in August 2020 following a $4.8 million Kickstarter campaign, the FlipperZero quickly became one of the most……
-
Overconfident execs are making their companies vulnerable to fraud
Cyber fraud (which includes activity such as hacking, deepfakes, voice cloning and highly sophisticated phishing schemes) rose by 14% year over year, according to Trustpair. … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/02/07/cyber-fraud-growth/
-
Police arrest teenager suspected of hacking NATO and numerous Spanish institutions
Spain’s National Police, in a joint operation with the Civil Guard, has arrested an 18-year-old suspected of being the hacker going by aliases including “Natohub,” and known for hacking the computer services of private companies and Spanish institutions such as the Civil Guard, the Ministry of Defense, the National Mint, and the Ministry of Education,…
-
Kimsuky hackers use new custom RDP Wrapper for remote access
The North Korean hacking group known as Kimsuky was observed in recent attacks using a custom-built RDP Wrapper and proxy tools to directly access infected machines. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/kimsuky-hackers-use-new-custom-rdp-wrapper-for-remote-access/
-
Beware of Nova Stealer Malware Sold for $50 on Hacking Forums
The cybersecurity landscape faces a new challenge with the emergence of Nova Stealer, a malware marketed under the Malware-as-a-Service (MaaS) model. Priced as low as $50 for a 30-day license, this malicious tool has gained traction among cybercriminals for its affordability and effectiveness. Nova Stealer, a modified variant of the SnakeLogger malware, is designed to…
-
Paragon Spyware Allegedly Ends Spyware Contract with Italy
Paragon Solutions, an Israeli cybersecurity firm, has reportedly ended its spyware contract with Italy. The termination comes in the wake of revelations that its military-grade hacking software, Graphite, was allegedly used to target 90 individuals, including journalists and activists, across two dozen countries. This includes three Italian figures critical of the government’s policies. The spyware…
-
North Korean APT Kimsuky Uses forceCopy Malware to Steal Browser-Stored Credentials
Tags: apt, attack, credentials, email, group, hacking, intelligence, korea, malware, microsoft, north-korea, office, phishing, spear-phishing, windowsThe North Korea-linked nation-state hacking group known as Kimsuky has been observed conducting spear-phishing attacks to deliver an information stealer malware named forceCopy, according to new findings from the AhnLab Security Intelligence Center (ASEC).The attacks commence with phishing emails containing a Windows shortcut (LNK) file that’s disguised as a Microsoft Office or PDF document. First…
-
North Korean Hackers Use custom-made RDP Wrapper to activate remote desktop on Hacked Machines
In a concerning development, the North Korean-backed hacking group Kimsuky has intensified its use of custom-built tools to exploit Remote Desktop Protocol (RDP) for controlling compromised systems. AhnLab Security Intelligence Center (ASEC) reports that the group has developed a proprietary version of the open-source RDP Wrapper to enable remote desktop access on machines where this…
-
Italy says Paragon spyware targeted victims in dozens of European countries
Seven Italians and victims in more than a dozen other European countries were targeted with spyware as part of a broad hacking campaign revealed by WhatsApp on Friday, the Italian government said. First seen on therecord.media Jump to article: therecord.media/italy-paragon-spyware-targeted-european-victims-whatsapp
-
Lazarus APT targets crypto wallets using cross-platform JavaScript stealer
The North Korea-linked APT group Lazarus uses a cross-platform JavaScript stealer to target crypto wallets in a new hacking campaign. Bitdefender researchers reported that the North Korea-linkedLazarus groupuses fake LinkedIn job offers in the cryptocurrency and travel sectors to deliver a cross-platform JavaScript stealer to target crypto wallets in a new hacking campaign. Scammers lure…
-
Chinese Hackers Attacking Linux Devices With New SSH Backdoor
A sophisticated cyber espionage campaign attributed to the Chinese hacking group DaggerFly has been identified, targeting Linux systems through an advanced Secure Shell (SSH) backdoor known as ELF/Sshdinjector.A!tr. This malware, part of a broader attack framework, compromises Linux-based network appliances and Internet-of-Things (IoT) devices, enabling data exfiltration and prolonged persistence within compromised environments. Discovered in…
-
Chinese cyberspies use new SSH backdoor in network device hacks
A Chinese hacking group is hijacking the SSH daemon on network appliances by injecting malware into the process for persistent access and covert operations. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/chinese-cyberspies-use-new-ssh-backdoor-in-network-device-hacks/
-
Musk’s DOGE effort could spread malware, expose US systems to threat actors
Tags: access, ai, api, attack, authentication, ceo, cio, computer, computing, control, cyber, cybercrime, cybersecurity, data, defense, email, exploit, governance, government, hacking, infection, infosec, international, jobs, malicious, malware, network, office, privacy, ransomware, risk, service, technology, threat, toolOver the past 10 days, an astonishing series of actions by Elon Musk via his Department of Government Efficiency (DOGE) project has elevated the cybersecurity risk of some of the most sensitive computing systems in the US government. Musk and his team of young, inexperienced engineers, at least one of whom is not a US…
-
DOJ, Allies Seize Cybercrime Forums Affecting 17 Million-Plus Americans
Investigators from the United States and other countries seized and shut down two online cybercriminal marketplaces, Cracked and Nulled, that they said affected more than 17 million Americans by selling hacking tools and stolen information to bad actors. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/doj-allies-seize-cybercrime-forums-affecting-17-million-plus-americans/
-
Russian hackers suspected of compromising British PM’s personal email account
Russia is suspected of hacking into the personal email account of Keir Starmer before before he became Britain’s prime minister, according to a new book. First seen on therecord.media Jump to article: therecord.media/keir-starmer-email-hack-russia-suspected

