hackers

  1. Tomcat

    Unfading Sea Haze: How hackers are trying to redraw the map of the South China Sea

    A group possibly linked to China has been terrorizing Asia for 6 years. Bitdefender, a developer of antivirus solutions, is investigating the activities of a hacker group called Unfading Sea Haze . According to a recent report, this low-profile group has been operating since 2018 and is likely...
  2. Tomcat

    US Water Supply at gunpoint for Hackers: EPA Steps up security Measures

    Public utilities should take urgent measures to avoid criminal prosecution. The US Federal Environmental Protection Agency (EPA) is stepping up oversight of critical water infrastructure due to the growing threat of cyber attacks. Yesterday, the agency issued a warning calling on municipal...
  3. Tomcat

    "I didn't mean to." What excuses for carders and hackers can work in court.

    Even if the hacker is eaten, he will have at least two options left. But if the hacker was detained by harsh people in uniform, there may be fewer exits. Usually, in such cases, they advise you to hire an intelligent lawyer and hope for the best, and even while waiting for the denouement, you...
  4. Tomcat

    The most famous hackers and carders in the world

    A "carder", in the original meaning of the word, is a person who likes to research the details of programmable systems, studies how to improve their capabilities, programs something with enthusiasm, and simply loves to program. Also, a "hacker" is a person who is an expert in a particular field...
  5. Father

    GhostEngine: how hackers mine cryptocurrency using Avast drivers

    Even EDR solutions are powerless against such a well-thought-out campaign. Elastic Security Labs and Antiy specialists have identified a new cryptocurrency mining campaign codenamed REF4578, in which GhostEngine malware uses vulnerable drivers to disable antivirus programs and launch the XMRig...
  6. Father

    Amazon, Google and Microsoft open to hackers: Fluent Bit bug gives access to data

    DoS attacks and code execution affect the largest cloud providers and IT giants. Tenable specialists have identified a critical vulnerability in Fluent Bit that can lead to a DoS attack and remote code execution. The flaw affects all major cloud providers, such as Amazon AWS, Google GCP, and...
  7. Father

    Kaspersky Lab: old vulnerabilities are back in fashion for hackers

    How Log4Shell, BlueKeep, and OpenSMTPD affect companies cybersecurity. Kaspersky Lab has published a new report, Cyber Threat Landscape for Russia and the CIS for the first quarter of 2024 and the entire year 2023. In the document, the Kaspersky Cyber Threat Intelligence team described in...
  8. Father

    Kinsing hackers declare war on open source projects

    The proprietary cryptojacking botnet is constantly expanding, causing problems for hundreds of organizations. The Kinsing cryptojacking group continues to evolve, posing a constant threat in the digital space. AquaSec reports that Kinsing has been continuously organizing illegal cryptocurrency...
  9. Father

    Reward of $5 million: the US announced a hunt for North Korean hackers

    Law enforcement officers want to close the issue of spies penetration into private and state-owned companies once and for all. The United States is offering a reward of up to $ 5 million for information that will help stop the employment scheme of North Korean hackers for remote IT positions in...
  10. Father

    GhostStripe: Hackers forced Tesla autopilot to violate traffic rules

    The technique of deception of autonomous car cameras shows a high success rate. A group of scientists from Singapore has developed a way to interfere with the operation of autonomous cars that use computer vision to recognize road signs. The new GhostStripe technique can be dangerous for Tesla...
  11. Father

    Google ads are a loophole for hackers: Rapid7 doesn't recommend downloading Windows utilities from third-party sites

    Malvertising continues to gain popularity. Cybercriminals have come up with a sophisticated scheme to infect corporate networks with malicious software. They place advertisements in search engines such as Google with links to download popular utilities for Windows. However, victims receive...
  12. Father

    In Ryazan hackers will appear in court for theft of data of 159 thousand cards

    Criminals have been hacking the websites of online stores for several years. The Investigative Department of the Russian Interior Ministry has completed a preliminary investigation of a criminal case against a group of hackers who for several years hacked the websites of online stores and stole...
  13. Father

    Chinese hackers steal AI secrets from leading companies in the industry

    What do cybercriminals plan to do with the information they receive? Security researchers at Proofpoint have discovered that a hacker group allegedly operating in the interests of China is using a new version of the SugarGh0st RAT malware to steal information from artificial intelligence...
  14. Father

    Gomir: a new tool for hackers from North Korea to attack Linux

    South Korean government networks have tested the power of the Trojan. Cybersecurity company Symantec identified a new tool of the North Korean group Kimsuki, which is used to attack government and commercial organizations in South Korea. The new malware is called Gomir and is a Linux version...
  15. Father

    How hackers substitute DNS queries with the help of "poisoning" the cache

    Domain Name Server spoofing (DNS) is a cyberattack where an attacker directs the victim's traffic to a malicious site (instead of a legitimate IP address). Attackers use the method of" poisoning " the DNS cache to intercept Internet traffic and steal credentials or confidential information. DNS...
  16. Father

    Who hacked Ashley Madison: Hackers who destroyed millions of families are still at large

    In 2015, the portal for "anonymous" infidelities made one of the most high-profile leaks of the century… In the early 2000s, the dating site Ashley Madison, which helped married people start extramarital affairs, was experiencing a peak in popularity. More than 37 million people have registered...
  17. Father

    PoC in the network: D-Link routers were in the hands of hackers because of 0day

    Massive attacks on vulnerable routers are now a matter of time. SSD Secure Disclosure discovered vulnerabilities in the D-Link EXO AX4800 router (DIR-X4860) that allow you to take full control of the device. Flaws were found in DIR-X4860 routers with the latest firmware version...
  18. Father

    Hackers rejoice: NVD drowned in a backlog of vulnerabilities

    3 months without updates is a great opportunity for cybercriminals. The world's largest vulnerability database, NVD, managed by the US National Institute of Standards and Technology (NIST), recently experienced a major outage that resulted in a significant increase in the number of unpublished...
  19. Father

    Timitator: Next-generation hackers attack China's critical infrastructure

    Rust-based software, fake signatures, and communication with OceanLotus. What else will surprise the group? In the period from 2022 to 2023, the Timitator group of cyber criminals actively attacked Chinese energy, scientific and military institutions. The attacks were carried out using phishing...
  20. Father

    MITRE EMB3D: New model helps device manufacturers stay ahead of Hackers

    The simulation environment will allow you to create invulnerable devices that do not need additional protection. MITRE Corporation has introduced a new threat modeling framework, EMB3D, designed for manufacturers of embedded devices used in mission-critical infrastructures. The model provides a...
Top