hack

  1. Father

    Dell hack: data from 49 million customers found themselves online

    Your data was found online if you bought the company's products since 2017. Dell has confirmed the data leak of about 49 million customers who purchased the company's products since 2017. The incident affected the Dell portal, which contained information about customer purchases. Among the...
  2. Father

    Hack the Telit Cinterion modem: how a single SMS gives you complete control over your device

    Vulnerabilities in modems allow you to bypass security measures and take possession of someone else's device. Dangerous vulnerabilities in Telit Cinterion cellular modems allow attackers to remotely execute arbitrary code using SMS messages. 8 different vulnerabilities were identified, 7 of...
  3. Father

    Hack like clockwork: case studies and tips for dealing with cybercriminals

    Cryptographic attacks are sweeping the world like a tsunami. In Russia, companies with previously compromised credentials are more likely to fall under the wave. Another situation is when victims used publicly available applications with vulnerabilities, such as Microsoft Exchange. If the first...
  4. Father

    Dangerous Connections: How criminals hack IT products via GitHub

    In this new article, read expert advice on protecting against cyber attacks through third-party code repositories. At the end of 2023, an article titled "One Attack on the Supply Chain to rule everyone" appeared on the Internet, which described a way to gain access to the GitHub repository...
  5. Father

    Hack AI is no longer possible: MIT creates a chip that is invulnerable to hackers

    A new chip for machine learning will prevent hacking and change the design of devices. MIT developed a new type of machine learning accelerator that is resistant to the most common types of attacks. The device allows you to safely process health applications on smartphones, without sacrificing...
  6. Father

    Octapharma Plasma Hack: Residents denied blood donations due to BlackSuit

    The closure of the plasma empire has jeopardized drug development. Medical company Octapharma Plasma has faced a major problem in its IT infrastructure, which has led to the closure of more than 150 blood plasma collection centers in the United States. A banner appeared on the company's...
  7. Father

    Hackers use images to hack Telegram: Don't get hooked

    "You'll like it" is a phrase that you should be wary of in Telegram. Cybercriminals started hacking Telegram accounts using thematic sites with images, analysts of the Solar Group of companies said. Employees of the Solar AURA external digital threat monitoring center found more than 300...
  8. Father

    Is Skynet close? GPT-4 has learned how to hack systems on its own, exploiting current vulnerabilities.

    In the coming years, AI will become the most experienced cybercriminal on Earth. Scientists from the University of Illinois at Urbana-Champaign recently published a study in which they proved that the GPT-4 artificial intelligence model from OpenAI is able to independently exploit...
  9. Father

    Omni Hotels hack: Hackers hold millions of customers hostage

    Now the privacy of Omni Hotels guests depends on the generosity of management. The Daixin Team cybercrime group has claimed responsibility for a recent attack on the Omni Hotels & Resorts chain and is threatening to release confidential customer information if the ransom is not paid. Omni...
  10. Father

    Sisense hack: the data of the largest US companies was in the hands of hackers

    Compromising the supply chain can affect critical infrastructure. The CISA took control of the situation around the data security breach of the American company Sisense, specializing in business intelligence. The incident had a significant impact on critical infrastructure organizations...
  11. Father

    Your insurance number is enough to hack an entire hospital

    HHS teaches health care support services not to be too trusting. The U.S. Department of Health and Human Services (HHS) is warning health care providers and insurance companies about a new threat. According to the Health Sector Cybersecurity Coordination Center (HC3), attackers are increasingly...
  12. Teacher

    OpenAI accused The New York Times of "tens of thousands" of attempts to hack ChatGPT

    The NYT is not giving up in the battle with OpenAI for copyright content. The New York Times responded to OpenAI's claims that the publication allegedly used ChatGPT hacking methods to prepare a lawsuit against OpenAI. The publication categorically rejects OpenAI's accusations, describing them...
  13. Teacher

    Anycubic hack: Unknown person got access to thousands of 3D printers

    Should device owners worry and who is actually behind the attack? The network reported that Anycubic 3D printers connected to the Internet were hacked in order to warn users about a critical vulnerability of the devices. The hacker added a file called " hacked_machine_readme.gcode", which...
  14. Teacher

    FCKeditor: Hackers use 14-year-old editor to hack university and government websites

    A clear example of how non-updated software harms user security. Cybercriminals use an outdated CMS content editor that was discontinued 14 years ago to manipulate search results and direct users to malicious sites or fraudulent resources. The main tactic of attackers is to use so-called open...
  15. Teacher

    Hollywood cried: LAX VIP clients were the victim of a large-scale hack

    The leak of 2.5 million records casts a shadow on the reputation of the international airport. A well-known hacker under the pseudonym IntelBroker, responsible for hacking General Electric, Hewlett Packard Enterprise and DC Health Link , claims that this time he managed to break into the...
  16. Teacher

    How to hack Apple and get $2.5 million: a story of betrayal and confession

    Apple thanked the hacker arrested for hacking the company's systems. A cybersecurity researcher who previously reported several vulnerabilities in Apple products is accused of breaking into Apple's internal infrastructure and defrauding the corporation of $2.5 million through gift cards and...
  17. Brother

    Lush hack: passports and financial documents of a major cosmetics manufacturer were stolen

    What does the company expect if its data becomes publicly available? The British company Lush, a well-known global manufacturer of cosmetics and bath bombs, was subjected to a cyber attack. Hacker group Akira claimed responsibility for the attack, saying it stole 110 GB of data, including...
  18. Brother

    Socket infrastructure protocol lost $3.3 million in hack

    The team at cross-chain bridge aggregator Socket reported an attack that resulted in the protocol losing $3.3 million. “There was a security incident at Socket that affected infinite contract approval wallets. We have identified the issue and have suspended the affected contracts,” the...
  19. Brother

    Credit protocol Radiant Capital lost $4.5 million in hack

    Cross-chain decentralized lending protocol Radiant Capital has confirmed the hack of a new liquidity pool based on the Arbitrum network. Hackers managed to withdraw 1,900 ETH (about $4.5 million). According to blockchain security company PeckShield, attackers took advantage of a known...
  20. Brother

    CloudSEK Disclosed OAuth 2.0 Hack Method to Compromise Google Accounts

    According to a report provided by CloudSEK, a new hacking method allows attackers to exploit the functionality of the OAuth 2.0 authorization protocol to compromise Google accounts. This method allows you to maintain valid sessions by regenerating cookies, even after changing your IP address or...
Top