Tag: hacking
-
Hacker Conversations: Dan McInerney and Puzzle-Driven Hacking
McInerney’s path to becoming a hacker is subtly different to many other hackers. He started as a 22-year old psychology graduate rather than a computer-obsessed 9-year old kid. The post Hacker Conversations: Dan McInerney and Puzzle-Driven Hacking appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/hacker-conversations-dan-mcinerney-and-puzzle-driven-hacking/
-
Russia Indicts Ransomware Hacker Wanted by the FBI
Suspected LockBit, Babuk Operator Mikhail Matveev Arrested in Russia. A prolific ransomware affiliate hacker and developer is facing criminal charges in Russia, Kremlin media reported Friday. Mikhail Pavlovich Matveev has been wanted by U.S. authorities since 2023 for his role in hacking activities as part of ransomware groups including LockBit, Hive and Babuk. First seen…
-
Chinese Lidar Sensors Pose Hacking Risk To US Defense Equipment
First seen on packetstormsecurity.com Jump to article: packetstormsecurity.com/news/view/36651/Chinese-Lidar-Sensors-Pose-Hacking-Risk-To-US-Defense-Equipment.html
-
Operation >>Code on Toast<<: A Deep Dive into TA-RedAnt's Exploitation of Zero-Day Flaw (CVE-2024-38178)
North Korean-linked hacking group TA-RedAnt has been implicated in a sophisticated large-scale cyber attack dubbed >>Operation Code on Toast,
-
Capture The Flag: 5 Websites, um deine Hacking-Fähigkeiten zu verbessern
Tags: hackingenden Herausforderungen und Wettbewerben bieten CTFs eine hervorragende Gelegenheit, Ihre Sicherheits- und Problemlösungsfähigkeiten zu testen und zu … First seen on welivesecurity.com Jump to article: www.welivesecurity.com/de/anleitungen/capture-the-flag-5-websites-um-deine-hacking-faehigkeiten-zu-verbessern/
-
Klein, aber oho: Die Top 5 der mobilen Hacking-Tools
Diese Zusammenstellung zeigt fünf leistungsstarke Geräte. Sie unterstützen ‘Red Teams bei Sicherheitstests und helfen Hobby-Hackern, ihr Wissen zu erw… First seen on welivesecurity.com Jump to article: www.welivesecurity.com/de/cybercrime/klein-aber-oho-die-top-5-der-mobilen-hacking-tools/
-
Hacking Millions of Modems: A Critical Wake-Up Call for Network Security
Recently, renowned security researcher Sam Curry exposed a critical security flaw affecting millions of modems, particularly those used by Cox Communi… First seen on thefinalhop.com Jump to article: www.thefinalhop.com/hacking-millions-of-modems-a-critical-wake-up-call-for-network-security/
-
Fired Disney worker accused of hacking into restaurant menus, replacing them with Windings and false peanut allergy information
Tags: hackingA disgruntled former Disney employee is facing charges that he hacked into the company’s restaurant menu systems and wreaked havoc on its digital disp… First seen on bitdefender.com Jump to article: www.bitdefender.com/en-us/blog/hotforsecurity/fired-disney-worker-hacking-restaurant-menus-replacing-false-peanut-allergy/
-
CVE-2024-38193 Exploited by Lazarus Group in Targeted Attacks
A newly patched security vulnerability in Microsoft Windows has been actively exploited by the Lazarus Group, a notorious state-sponsored hacking grou… First seen on sensorstechforum.com Jump to article: sensorstechforum.com/cve-2024-38193-lazarus-group/
-
Notorious ransomware programmer Mikhail Pavlovich Matveev arrested in Russia
Russian authorities arrested ransomware affiliate Mikhail Matveev, aka Wazawaka, for developing malware and ties to hacking groups. Russian authorities arrested a ransomware affiliate, Mikhail Pavlovich Matveev (also known as Wazawaka, Uhodiransomwar, m1x, and Boriselcin), and charged him for developing malware and his role in several hacking groups. The man was arrested in Kaliningrad, Russia, law…
-
Russia arrests cybercriminal Wazawaka for ties with ransomware gangs
Russian law enforcement has arrested and indicted notorious ransomware affiliate Mikhail Pavlovich Matveev (also known as Wazawaka, Uhodiransomwar, m1x, and Boriselcin) for developing malware and his involvement in several hacking groups. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/russia-arrests-cybercriminal-wazawaka-for-ties-with-ransomware-gangs/
-
Wie man Videospiel-Engines für Hacking missbraucht
Check Point Software Technologies kam einer neuen Hacker-Masche auf die Spur. Mithilfe der Gaming-Engine können Cyberkriminelle verschiedene Betriebssysteme von vernetzten Geräten attackieren, darunter Windows, MacOS, Linux, Android und iOS. Verbreitet wird der schädliche Code von dem Malware-Netzwerk , die Check Point vor einigen Monaten untersucht hatte, über die Open-Source-Plattform Github. In […] First seen on…
-
Smashing Security podcast #395: Gym hacking, disappearing DNA, and a social lockout
Tags: hackingA Kansas City man is accused of hacking into local businesses, not to steal money, but to… get a cheaper gym membership? A DNA-testing firm has vanished, leaving customers in the dark about what’s happened to their sensitive genetic data. And Australia mulls a social media ban for youngsters. First seen on grahamcluley.com Jump to…
-
T-Mobile Says Sensitive Customer Data Wasn’t Impacted In China-Linked Attack
T-Mobile CISO Jeff Simon said a post Wednesday that ‘our defenses protected our sensitive customer information,’ in the wake of reports about a major hacking operation by a China-linked threat actor targeting internet service providers. First seen on crn.com Jump to article: www.crn.com/news/security/2024/t-mobile-says-sensitive-customer-data-wasn-t-impacted-in-china-linked-attack
-
Appeals court tosses sanctions on Tornado cash crypto mixer
The mixer was sanctioned after a North Korea hacking group used the software to launder more than $455 million. First seen on cyberscoop.com Jump to article: cyberscoop.com/tornado-cash-sanctions-overturned-lazarus-group/
-
Feds Seek To Grill Kansas City Man With Hacking Charges
Tags: hackingFirst seen on packetstormsecurity.com Jump to article: packetstormsecurity.com/news/view/36645/Feds-Seek-To-Grill-Kansas-City-Man-With-Hacking-Charges.html
-
Hackers Exploit Firefox and Windows Flaws: RomCom’s Advanced Attack Unveiled
A Russia-aligned hacking group, known as RomCom (also identified as Storm-0978, Tropical Scorpius, or UNC2596), has successfully exploited two zero-day vulnerabilities”, one in Mozilla Firefox and another in Microsoft Windows Task Scheduler. These vulnerabilities, identified as CVE-2024-9680 and CVE-2024-49039, were chained together to allow the group to execute arbitrary code and install malicious backdoors on…
-
Russian Hackers Target Mozilla, Windows in New Exploit Chain
ESET Discovers Two Major Vulnerabilities Exploited by Russian RomCom Hacking Group. Two vulnerabilities in Mozilla products and Windows are actively exploited by RomCom, a Kremlin-linked cybercriminal group known for targeting businesses and conducting espionage, warn security researchers from Eset. Exploiting the two flaws together enables attackers to execute arbitrary code. First seen on govinfosecurity.com Jump…
-
Russia-linked hackers exploited Firefox and Windows bugs in ‘widespread’ hacking campaign
The Russia-aligned RomCom gang exploited the vulnerabilities to target hundreds of Firefox users across Europe and North America. First seen on techcrunch.com Jump to article: techcrunch.com/2024/11/26/russia-linked-hackers-exploited-firefox-and-windows-zero-day-bugs-in-widespread-hacking-campaign/
-
RomCom Hackers Exploits Windows Firefox Zero-Day in Advanced Cyberattacks
In a new wave of cyberattacks, the Russia-aligned hacking group >>RomCom>The compromise chain is composed of a […] The post RomCom Hackers Exploits Windows & Firefox Zero-Day in Advanced Cyberattacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform. First seen on gbhackers.com Jump to article: gbhackers.com/romcom-hackers-exploits-windows-firefox-zero-day/
-
US offers $10 million bounty for members of Iranian hacking gang
First seen on bitdefender.com Jump to article: www.bitdefender.com/en-us/blog/hotforsecurity/us-offers-10-million-bounty-for-members-of-iranian-hacking-gang
-
Here’s how simple it is for script kiddies to stand up DDoS services
How plug-and-play hacking tools and lax configs helped a Russian script kiddie start a scheme. First seen on cyberscoop.com Jump to article: cyberscoop.com/russian-hacker-script-matrix-ddos-aqua/
-
Chinese Hackers Use GHOSTSPIDER Malware to Hack Telecoms Across 12+ Countries
The China-linked threat actor known as Earth Estries has been observed using a previously undocumented backdoor called GHOSTSPIDER as part of its attacks targeting Southeast Asian telecommunications companies. Trend Micro, which described the hacking group as an aggressive advanced persistent threat (APT), said the intrusions also involved the use of another cross-platform backdoor dubbed First…
-
Kansas City Man Indicted for Hacking into Nonprofit and Health Club
A 31-year-old man has been indicted by a federal grand jury for hacking into the computer systems of a nonprofit organization and a health club business. The indictment, unsealed today,... First seen on securityonline.info Jump to article: securityonline.info/kansas-city-man-indicted-for-hacking-into-nonprofit-and-health-club/
-
Experts Urge Sober Assessment of Russian Hacking
Speech by UK Minister Pat McFadden Sparks Backlash. A warning from a British government official over Russian cyberwar sparked backlash from cybersecurity specialists who urged a measured approach. Russian attacks could turn the lights off for millions of people, said Pat McFadden, minister for intergovernmental First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/experts-urge-sober-assessment-russian-hacking-a-26903
-
DEF CON 32 From Getting JTAG On The iPhone 15 To Hacking Apple’s USB-C Controller
Authors/Presenters: Stacksmashing Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/11/def-con-32-from-getting-jtag-on-the-iphone-15-to-hacking-apples-usb-c-controller/
-
Fired Disney staffer accused of hacking menu to add profanity, wingdings, removes allergen info
Tags: hackingFirst seen on theregister.com Jump to article: www.theregister.com/2024/10/30/fired_disney_employee_hacks_menu/
-
DOJ: Man hacked networks to pitch cybersecurity services
A Kansas City man has been indicted for allegedly hacking into computer networks and using this access to promote his cybersecurity services. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/doj-man-hacked-networks-to-pitch-cybersecurity-services/
-
FBI pierces ‘anonymity’ of cryptocurrency, secret domain registrars in Scattered Spider probe
The US Justice Department on Wednesday announced the arrest of five suspected members of the notorious Scattered Spider phishing crew, but the most interesting part of the case was a US Federal Bureau of Investigation (FBI) document detailing how easily the feds were able to track the phishers’ movements and activities. In recent years, services that push…

