Tag: hacking
-
US Scrambles to Patch F5 Amid China-Linked Breach
Concerns Grow Over F5 Hacking Amid Stalled Government Shutdown. Federal officials are scrambling to contain nation-state hackers exploiting stolen source code from networking devices and software maker F5 amid staffing pressures created by the ongoing government shutdown. Stolen files reportedly include undisclosed vulnerabilities F5 had been researching. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/us-scrambles-to-patch-f5-amid-china-linked-breach-a-29759
-
Regional airline Envoy Air confirms Oracle E-Business Suite compromise
The regional American airline Envoy Air confirmed that its IT system was impacted by a recent hacking campaign targeting Oracle E-Business Suite. First seen on therecord.media Jump to article: therecord.media/regional-airline-envoy-oracle
-
North Korean Hackers Combine BeaverTail and OtterCookie into Advanced JS Malware
The North Korean threat actor linked to the Contagious Interview campaign has been observed merging some of the functionality of two of its malware programs, indicating that the hacking group is actively refining its toolset.That’s according to new findings from Cisco Talos, which said recent campaigns undertaken by the hacking group have seen the functions…
-
PowerSchool hacker got four years in prison
Matthew D. Lane, a Massachusetts student, got four years in prison for hacking and extorting $3M from PowerSchool and another company. A Massachusetts student, Matthew D. Lane, was sentenced to four years in prison for hacking and extorting about $3 million from two companies, including PowerSchool. In May, Lane pleaded guilty to hacking two U.S.…
-
PowerSchool hacker got four years in prison
Matthew D. Lane, a Massachusetts student, got four years in prison for hacking and extorting $3M from PowerSchool and another company. A Massachusetts student, Matthew D. Lane, was sentenced to four years in prison for hacking and extorting about $3 million from two companies, including PowerSchool. In May, Lane pleaded guilty to hacking two U.S.…
-
North Korean hackers seen using blockchain to hide crypto-stealing malware
Google security researchers said on Thursday that they observed a Pyongyang-backed hacking group, tracked as UNC5342, deploying a method known as EtherHiding, a way of embedding malicious code inside smart contracts on decentralized networks such as Ethereum and BNB Smart Chain. First seen on therecord.media Jump to article: therecord.media/north-korean-hackers-using-blockchain-hiding-malware
-
Hackers Use Blockchain to Hide Malware in Plain Sight
Tags: attack, blockchain, google, group, hacker, hacking, intelligence, korea, malware, north-korea, threatState, Criminal Hackers Use Blockchain Technique to Evade Takedowns. Google’s Threat Intelligence Group found hacking groups like North Korea’s UNC5342 and criminal group UNC5142 using a public blockchain technique called EtherHiding to distribute malware. The method makes attacks tougher to trace, block or dismantle. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/hackers-use-blockchain-to-hide-malware-in-plain-sight-a-29741
-
Hackers Use Blockchain to Hide Malware in Plain Sight
Tags: attack, blockchain, google, group, hacker, hacking, intelligence, korea, malware, north-korea, threatState, Criminal Hackers Use Blockchain Technique to Evade Takedowns. Google’s Threat Intelligence Group found hacking groups like North Korea’s UNC5342 and criminal group UNC5142 using a public blockchain technique called EtherHiding to distribute malware. The method makes attacks tougher to trace, block or dismantle. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/hackers-use-blockchain-to-hide-malware-in-plain-sight-a-29741
-
North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts
Tags: blockchain, crypto, google, group, hacker, hacking, intelligence, korea, malware, north-korea, theft, threatA threat actor with ties to the Democratic People’s Republic of Korea (aka North Korea) has been observed leveraging the EtherHiding technique to distribute malware and enable cryptocurrency theft, marking the first time a state-sponsored hacking group has embraced the method.The activity has been attributed by Google Threat Intelligence Group (GTIG) to a threat cluster…
-
Hackers Use Blockchain to Hide Malware in Plain Sight
Tags: attack, blockchain, google, group, hacker, hacking, intelligence, korea, malware, north-korea, threatState, Criminal Hackers Use Blockchain Technique to Evade Takedowns. Google’s Threat Intelligence Group found hacking groups like North Korea’s UNC5342 and criminal group UNC5142 using a public blockchain technique called EtherHiding to distribute malware. The method makes attacks tougher to trace, block or dismantle. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/hackers-use-blockchain-to-hide-malware-in-plain-sight-a-29741
-
Chinese Threat Group ‘Jewelbug’ Quietly Infiltrated Russian IT Network for Months
A threat actor with ties to China has been attributed to a five-month-long intrusion targeting a Russian IT service provider, marking the hacking group’s expansion to the country beyond Southeast Asia and South America.The activity, which took place from January to May 2025, has been attributed by Broadcom-owned Symantec to a threat actor it tracks…
-
Chinese Hackers Exploit ArcGIS Server as Backdoor for Over a Year
Threat actors with ties to China have been attributed to a novel campaign that compromised an ArcGIS system and turned it into a backdoor for more than a year.The activity, per ReliaQuest, is the handiwork of a Chinese state-sponsored hacking group called Flax Typhoon, which is also tracked as Ethereal Panda and RedJuliett. According to…
-
2 Radiology Practices Disclose Hacks Affecting 1.5M Patients
Medusa Group Tied to Attack on SimonMed and Threats to Leak Stolen Data. Two radiology practices are notifying nearly 1.5 million people of separate hacking incidents compromising their sensitive health information. Cybercrime gang Medusa claimed credit for attacking Arizona-based SimonMed Imaging in January and threatened to leak the stolen data of nearly 1.3 million patients…
-
2 Radiology Practices Disclose Hacks Affecting 1.5M Patients
Medusa Group Tied to Attack on SimonMed and Threats to Leak Stolen Data. Two radiology practices are notifying nearly 1.5 million people of separate hacking incidents compromising their sensitive health information. Cybercrime gang Medusa claimed credit for attacking Arizona-based SimonMed Imaging in January and threatened to leak the stolen data of nearly 1.3 million patients…
-
Flax Typhoon can turn your own software against you
The Chinese hacking group gained persistent access to a popular mapping tool by turning one of its features into a webshell and hardcoding access, according to ReliaQuest. First seen on cyberscoop.com Jump to article: cyberscoop.com/flax-typhoon-hinese-state-hackers-arcgis-backdoor-webshell/
-
Flax Typhoon can turn your own software against you
The Chinese hacking group gained persistent access to a popular mapping tool by turning one of its features into a webshell and hardcoding access, according to ReliaQuest. First seen on cyberscoop.com Jump to article: cyberscoop.com/flax-typhoon-hinese-state-hackers-arcgis-backdoor-webshell/
-
SimonMed Data Breach Exposes Sensitive Information of 1.2 Million Patients
SimonMed Imaging has confirmed that an external hacking incident compromised the personal data of 1,275,669 patients, making it one of the largest healthcare breaches of the year. The breach, which occurred on January 21, 2025, but was not discovered until January 28, exposed names and other personal identifiers. Written notifications were sent to affected individuals…
-
EdTech Digest: Outdated Cyber Defenses Are Failing Schools”, Here’s the Fix
This article was originally published in EdTech Digest on 10/08/25 by Charlie Sander. With cyberattacks rising, schools can strengthen defenses through ethical hacking and proactive testing This back-to-school season, cybersecurity protocols need to be front of mind for leaders across K-12 school districts. The reason is clear: not only have we seen an alarming rise…
-
EdTech Digest: Outdated Cyber Defenses Are Failing Schools”, Here’s the Fix
This article was originally published in EdTech Digest on 10/08/25 by Charlie Sander. With cyberattacks rising, schools can strengthen defenses through ethical hacking and proactive testing This back-to-school season, cybersecurity protocols need to be front of mind for leaders across K-12 school districts. The reason is clear: not only have we seen an alarming rise…
-
2 Radiology Practices Notifying Nearly 1.5 Million of Hacks
Medusa Group Tied to Attack on SimonMed and Threats to Leak Stolen Data. Two radiology practices are notifying nearly 1.5 million people of separate hacking incidents compromising their sensitive health information. Cybercrime gang Medusa claimed credit for attacking Arizona-based SimonMed Imaging in January and threatened to leak the stolen data of nearly 1.3 million patients…
-
Prosecutors seek 7-year prison term for ‘sophisticated’ PowerSchool hacker
Prosecutors are seeking a seven-year prison sentence for the Massachusetts man who pleaded guilty to hacking into the education technology company PowerSchool’s databases. First seen on therecord.media Jump to article: therecord.media/powerschool-prison-sentence-hacker
-
Cybersecurity Snapshot: AI Security Skills Drive Up Cyber Salaries, as Cyber Teams Grow Arsenal of AI Tools, Reports Find
Tags: access, advisory, ai, attack, authentication, breach, business, ciso, cloud, computing, credentials, cve, cyber, cybersecurity, data, defense, endpoint, exploit, extortion, finance, framework, fraud, google, governance, guide, hacker, hacking, identity, incident response, Internet, iot, jobs, login, microsoft, monitoring, network, nist, oracle, organized, password, privacy, ransomware, risk, risk-assessment, risk-management, scam, skills, technology, threat, tool, training, update, vulnerability, vulnerability-management, zero-dayWant recruiters to show you the money? A new report says AI skills are your golden ticket. Plus, cyber teams are all in on AI, including agentic AI tools. Oh, and please patch a nasty Oracle zero-day bug ASAP. And get the latest on vulnerability management, IoT security and cyber fraud. Key takeaways Eager to…
-
Autonomous AI Hacking and the Future of Cybersecurity
AI agents are now hacking computers. They’re getting better at all phases of cyberattacks, faster than most of us expected. They can chain together different aspects of a cyber operation, and hack autonomously, at computer speeds and scale. This is going to change everything. Over the summer, hackers proved the concept, industry institutionalized it, and…
-
Autonomous AI Hacking and the Future of Cybersecurity
AI agents are now hacking computers. They’re getting better at all phases of cyberattacks, faster than most of us expected. They can chain together different aspects of a cyber operation, and hack autonomously, at computer speeds and scale. This is going to change everything. Over the summer, hackers proved the concept, industry institutionalized it, and…
-
Pro-Russian hackers caught bragging about attack on fake water utility
Cybersecurity company Forescout said a hacking group known as TwoNet fell for a honeypot that looked like the network for a Dutch water utility. First seen on therecord.media Jump to article: therecord.media/fake-water-utility-honeypot-hacked-pro-russian-group
-
Pro-Russian hackers caught bragging about attack on fake water utility
Cybersecurity company Forescout said a hacking group known as TwoNet fell for a honeypot that looked like the network for a Dutch water utility. First seen on therecord.media Jump to article: therecord.media/fake-water-utility-honeypot-hacked-pro-russian-group
-
FBI takes down BreachForums portal used for Salesforce extortion
The FBI has seized last night all domains for the BreachForums hacking forum operated by the ShinyHunters group mostly as a portal for leaking corporate data stolen in attacks from ransomware and extortion gangs. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/fbi-takes-down-breachforums-portal-used-for-salesforce-extortion/
-
‘Dozens’ of organizations had data stolen in Oracle-linked hacks
The mass-hacks targeting Oracle E-Business customers is the latest hacking campaign by Clop, an extortion group known for abusing security flaws in enterprise products to steal large amounts of sensitive data. First seen on techcrunch.com Jump to article: techcrunch.com/2025/10/09/dozens-of-organizations-had-data-stolen-in-oracle-linked-hacks/
-
Pro-Russian hacking group snared by Forescout Vedere Labs honeypot
Forescout Vedere Labs published a report exposing how a pro-Russian hacktivist group was duped into thinking they had hacked a European water facility, unaware their target was in fact a carefully crafted honeypot. This “hack” provided Forescout researchers the rare opportunity to see first-hand how these groups look for and exploit weaknesses in critical infrastructure. The…
-
RondoDox botnet targets 56 n-day flaws in worldwide attacks
A new large-scale botnet called RondoDox is targeting 56 vulnerabilities in more than 30 distinct devices, including flaws first disclosed during Pwn2Own hacking competitions. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/rondodox-botnet-targets-56-n-day-flaws-in-worldwide-attacks/

