hacking news

  1. Jaysu

    News Chinese police seize large batch of spy powerbanks from free sale

    Inside such powerbanks is a GPS module and a cellular communication module with a SIM card. The devices also perform their main function-they charge the equipment, but they can also record the conversation of their owner at any time and send it to a remote server. The spy device contains a GPS...
  2. Dep

    News The student was charged with hacking the website of the Ministry of Education

    The court found the 17-year-old student guilty of committing a criminal offense under Article 273 of the Criminal Code of the Russian Federation. In Vats, a student was charged with hacking the website of the Ministry of Education of the Novosibirsk Region. Studying remotely, a student of the...
  3. Core

    News Cyber spies hacked the IT system of the Finnish Parliament

    The attackers gained access to the e-mail of a number of Finnish deputies. According to the Finnish Parliament, hackers gained access to its internal IT system and hacked the e-mail of some deputies. The incident took place in the autumn of this year, but was discovered by IT specialists of...
  4. Tasken

    News Why don't intelligence agencies and hackers have trouble breaking into iPhones?

    After 2012, Apple loosened the protection of devices and began to apply strong encryption to less data. A group of cryptography experts has offered a theory about why law enforcement is still able to hack the iPhone, despite the constant iOS fixes and security levels of the mobile device...
  5. Soldier

    News In the UK, more than 20 customers of the WeLeakInfo platform were arrested

    The suspects used the stolen personal data of users to commit cybercrimes. In the UK, as part of the fight against cybercrime, 21 people were arrested who acquired access to data stolen as a result of hacking other websites on the now-defunct WeLeakInfo resource. According to the National...
  6. Tasken

    News Hackers stole emails of customers of Microsoft cloud services p

    In the company itself, Microsoft said that it did not identify any vulnerabilities and traces of hacking of the provided products or cloud service. Allegedly, Russian hackers broke into the computer systems of a corporate partner of Microsoft and stole emails from users of Microsoft cloud...
  7. al capone

    News Attackers inject malicious code into browser extensions

    Experts have identified more than twenty modified extensions, including the popular Frigate Light, Frigate CDN and SaveFrom. Experts from Kaspersky Lab and Yandex have discovered a large-scale potentially malicious campaign in which attackers inject malicious code into browser extensions...
  8. Dorblue

    News Internet scammers have deceived Russians into stealing about 150 billion rubles in 2020

    58% of users deceived by phone scammers independently transferred money. Telephone and Internet scammers in 2020 earned about 150 billion rubles from Russian citizens, 66 billion rubles of which fall on the income of attackers posing as Bank employees. According to analysts of BrandMonitor...
  9. Lucky

    News In the darknet, prices for access via RDP, DDoS attacks and payment card data are growing

    The price for a fully managed DDoS attack is $165 on the darknet. image Cybersecurity researchers at Flashpoint have reported rising prices for access to RDP servers, stolen payment card data and a "DDoS-as-a-service" business model on underground forums and trading platforms. "As a result of...
  10. Lucky

    News The network got the addresses of 270,000 owners of Ledger crypto wallets

    On the hacker forum found a database containing email addresses and physical addresses of owners of hardware wallets Ledger, according to the publication Bleeping Computer. Journalists recall that in the summer of this year, the company Ledger suffered from a data leak, and a vulnerability on...
  11. Soldier

    News Addresses of 270 thousand owners of Ledger wallets published on the hacker forum

    Ledger has confirmed that the publication of the stolen data is likely linked to the June 2020 hack. The attacker posted stolen email addresses and email addresses of users of the Ledger cryptocurrency wallet on the hacker forum Raidforum. Recall that on June 25 of this year, hackers gained...
  12. Gap

    News Law enforcement officers managed to partially disable the largest carding site

    During the police operation, law enforcement officers managed to partially disrupt the work of the most popular trading platform, where cybercriminals sell and buy stolen data. This is evidenced by the reports of resource administrators and sources who had access to it, according to the...
  13. Serafim

    News AIR-FI attack Turns RAM into a Makeshift Wi-Fi Signal Source

    Experts from Israel's Ben-Gurion University demonstrated the AIR-FI attack, a new method for extracting data from machines that are physically isolated from any networks and potentially dangerous peripherals. such computers are often found in government systems and corporate networks, they store...
  14. Lucky

    News Millions of vulnerable OT and IoT devices pose a threat to critical infrastructure

    Thousands of organizations are at risk of cyberattacks due to uncorrected urgent/11 and cdpwn vulnerabilities affecting operating technology (ot) and iot devices, respectively. according to armis specialists, 97% of all ot equipment used today contains uncorrected urgent/11 vulnerabilities...
  15. Otto

    News Hackers who hacked solarwinds bypassed multi-factor authentication

    As SecurityLab wrote earlier, on December 13, SolarWinds reported that it was the victim of a cyber attack on the supply chain. Hackers funded by a foreign government broke into the networks of an American software manufacturer and implemented a malicious update for its Orion software in order...
  16. xanix

    News Pay2key ransomware stole and published Intel subsidiary's data

    the israeli developer of artificial intelligence processors habana labs, owned by intel, was subjected to a cyber attack using extortionate software, during which attackers stole confidential data. The operators of the pay2key ransomware published on their website on the darknet files allegedly...
  17. Lucky

    News Experts found more than 43 thousand unprotected SCADA systems around the world

    The number of IoT devices and SCADA systems connected to the Network without appropriate security measures continues to increase, making critical devices vulnerable to potential attacks and hacking attempts. A&O IT Group researchers reported that despite a number of high-profile attacks on SCADA...
  18. Soldier

    News Hackers stole data from the U.S. Treasury

    Foreign-backed hackers stole data from the U.S. Treasury Department and the National Telecommunications and Information Administration (NTIA). At the same time, information about which country's authorities are considered to be involved in the incident is not provided. "The U.S. government is...
  19. Soldier

    News Experts have developed methods for hacking applications with a fingerprint scanner

    Many modern smartphones have a fingerprint scanner to authorize access to the device, log in to your account, confirm payments, and other operations. The scanner is designed for secure authentication, but researchers have discovered new ways to manipulate it for malicious purposes. Security...
  20. Soldier

    News Chinese hackers suspected of attacking state structures in Mongolia

    Chinese cybercrime group APT is suspected of hacking the network of a Mongolian software company and hacking a chat app used by hundreds of Mongolian government agencies. According to experts from ESET, the attack occurred in June of this year. Hackers attacked an application called Able...
Top Bottom