hackers

  1. Father

    In Ryazan hackers will appear in court for theft of data of 159 thousand cards

    Criminals have been hacking the websites of online stores for several years. The Investigative Department of the Russian Interior Ministry has completed a preliminary investigation of a criminal case against a group of hackers who for several years hacked the websites of online stores and stole...
  2. Father

    Chinese hackers steal AI secrets from leading companies in the industry

    What do cybercriminals plan to do with the information they receive? Security researchers at Proofpoint have discovered that a hacker group allegedly operating in the interests of China is using a new version of the SugarGh0st RAT malware to steal information from artificial intelligence...
  3. Father

    Gomir: a new tool for hackers from North Korea to attack Linux

    South Korean government networks have tested the power of the Trojan. Cybersecurity company Symantec identified a new tool of the North Korean group Kimsuki, which is used to attack government and commercial organizations in South Korea. The new malware is called Gomir and is a Linux version...
  4. Father

    How hackers substitute DNS queries with the help of "poisoning" the cache

    Domain Name Server spoofing (DNS) is a cyberattack where an attacker directs the victim's traffic to a malicious site (instead of a legitimate IP address). Attackers use the method of" poisoning " the DNS cache to intercept Internet traffic and steal credentials or confidential information. DNS...
  5. Father

    Who hacked Ashley Madison: Hackers who destroyed millions of families are still at large

    In 2015, the portal for "anonymous" infidelities made one of the most high-profile leaks of the century… In the early 2000s, the dating site Ashley Madison, which helped married people start extramarital affairs, was experiencing a peak in popularity. More than 37 million people have registered...
  6. Father

    PoC in the network: D-Link routers were in the hands of hackers because of 0day

    Massive attacks on vulnerable routers are now a matter of time. SSD Secure Disclosure discovered vulnerabilities in the D-Link EXO AX4800 router (DIR-X4860) that allow you to take full control of the device. Flaws were found in DIR-X4860 routers with the latest firmware version...
  7. Father

    Hackers rejoice: NVD drowned in a backlog of vulnerabilities

    3 months without updates is a great opportunity for cybercriminals. The world's largest vulnerability database, NVD, managed by the US National Institute of Standards and Technology (NIST), recently experienced a major outage that resulted in a significant increase in the number of unpublished...
  8. Father

    Timitator: Next-generation hackers attack China's critical infrastructure

    Rust-based software, fake signatures, and communication with OceanLotus. What else will surprise the group? In the period from 2022 to 2023, the Timitator group of cyber criminals actively attacked Chinese energy, scientific and military institutions. The attacks were carried out using phishing...
  9. Father

    MITRE EMB3D: New model helps device manufacturers stay ahead of Hackers

    The simulation environment will allow you to create invulnerable devices that do not need additional protection. MITRE Corporation has introduced a new threat modeling framework, EMB3D, designed for manufacturers of embedded devices used in mission-critical infrastructures. The model provides a...
  10. Father

    DNS spying: Hackers actively monitor you over the Internet

    How did an ordinary network tool gradually turn into a powerful cyber weapon? Recently, hackers are increasingly using the DNS tunneling method to track when victims open phishing emails and click on malicious links, as well as to scan networks for vulnerabilities. DNS tunneling consists of...
  11. Father

    Cacti is under attack again: 12 vulnerabilities open up attack paths for hackers at once

    Update as soon as possible to protect vulnerable servers. The developers of Cacti, an open source network monitoring and management system, have fixed 12 vulnerabilities, including two critical ones that lead to arbitrary code execution. Here are the most serious of the patched...
  12. Father

    From spam to hacking: hackers offer help in the fight against intrusive mailings

    Some companies don't even know who is actually flooding them with emails. The researchers found an actively developing social engineering campaign aimed at obtaining initial access to corporate IT systems for their further operation. Attackers bombard businesses with spam mailings to capture...
  13. Father

    Logo virus: Hackers attack Python developers in an unusual way

    The popular "requests" package has been maliciously modified. Security researchers from Phylum discovered a malicious package in the popular PyPI repository that disguises itself as the popular "requests" library, but in reality poses a significant threat to the entire developer community. The...
  14. Father

    I went for help and made a bet: hackers turned India's state websites into crypto casinos

    A daring cyberattack exposed the vulnerabilities of dozens of government resources. Researchers of the TechCrunch identified about four dozen advertising links with the domain "gov.in" owned by the governments of various Indian states such as Bihar, Goa, Karnataka, Kerala, Mizoram and...
  15. Father

    Hackers in Stavropol region were suspended for using malicious programs

    The crime was solved by specialists of the regional Federal Security Service of Russia. This was reported in the press service of the ministry. The Federal Security Service of Russia for the Stavropol Territory has documented the illegal activities of local residents involved in the use of...
  16. Father

    Hackers cracked AI: LLMjacking allows you to sell access to the brains of machines

    The attack makes a loss of $46,000 daily. Sysdig discovered a new attack scheme in which stolen credentials for cloud services are used to access the services of cloud LLM models in order to sell access to other cybercriminals. The detected attack was directed at the Claude (v2/v3) model from...
  17. Father

    Genians: "North Korean hackers are actively operating on Facebook"

    A new malicious campaign leaves no chance for South Korean civil servants. North Korean hacker group Kimsuky uses advanced cyber espionage techniques, including the use of social networks and system management tools. This is reported by a recent report of the South Korean company Genians...
  18. Father

    Ascension hacked: hackers are increasingly biting into the US healthcare system

    More frequent attacks call into question the privacy of thousands of doctors and millions of patients. Ascension, one of the largest private healthcare systems in the United States, has been forced to shut down some of its systems to investigate what the organization describes as a...
  19. Father

    Dior, Prada and 76,000 fake websites: brand hunters caught in the network of Chinese hackers

    Hundreds of thousands of people lost money by trusting the wrong online stores. An international investigation conducted by The Guardian, Die Zeit and Le Monde has uncovered one of the largest Internet fraud schemes in history. Hundreds of thousands of people in Europe and the United States...
  20. Father

    Georgia universities caught on a year later: Hackers stole 800,000 people's data

    The high-profile hack of MOVEit Transfer still reminds us of itself with sudden information security discoveries. A year after a high-profile cyber attack by the Clop group, during which hundreds of companies were compromised with confidential data, the University system of Georgia (USG), which...
Top