hackers

  1. Father

    Ascension hacked: hackers are increasingly biting into the US healthcare system

    More frequent attacks call into question the privacy of thousands of doctors and millions of patients. Ascension, one of the largest private healthcare systems in the United States, has been forced to shut down some of its systems to investigate what the organization describes as a...
  2. Father

    Dior, Prada and 76,000 fake websites: brand hunters caught in the network of Chinese hackers

    Hundreds of thousands of people lost money by trusting the wrong online stores. An international investigation conducted by The Guardian, Die Zeit and Le Monde has uncovered one of the largest Internet fraud schemes in history. Hundreds of thousands of people in Europe and the United States...
  3. Father

    Georgia universities caught on a year later: Hackers stole 800,000 people's data

    The high-profile hack of MOVEit Transfer still reminds us of itself with sudden information security discoveries. A year after a high-profile cyber attack by the Clop group, during which hundreds of companies were compromised with confidential data, the University system of Georgia (USG), which...
  4. Father

    Hackers against the mayor: Wichita residents are exempt from paying fines and utilities

    Wichita demonstrates the dangers of cybercrime in the digital age. In Wichita, the largest city in the state of Kansas with a population of 400,000 people, a cyberattack occurred on May 5, as a result of which the information systems of the authorities were encrypted using a ransomware program...
  5. Father

    Types of modern hackers, and how they can do harm

    Hackers, as well as the malware they create and use, have shown rapid growth over the past couple of decades. When computers were big, colorful boxes, modern hackers were just learning how to walk, and their pranks were not serious - perhaps they would have created a bit of stupid malware that...
  6. Father

    10 essential skills and qualities of ethical hackers

    What if you could spend your time trying to access other people's networks and computer systems without getting into trouble? Of course, this is the dream of any spy and cybercriminal, but only ethical hackers, also known as" white hat hackers " or penetration testers (pentesters), can be sure...
  7. Father

    How Operational Security Failures Affect Hackers

    Every day, most of us leave behind traces on the Internet, including disparate pieces of data that can later be used to learn about a person's activities and break through the veil of anonymity, writes CSO. The fight to prevent attackers from putting these pieces of the puzzle together is known...
  8. Father

    Ethical hacking: what is it and where is it used? Who are the white hackers?

    Table of contents How to become an Ethical Hacker How is hacker ethics measured? Current situation with Bug Bounty in Russia Conclusion Hacking is a kind of flagship of media information security. Cult films are made about hackers. Many teenagers and aspiring IT professionals are eager to...
  9. Father

    Why and how hackers break into websites

    Now it's hard to find a company that doesn't have its own website. Some people use this resource as an element of self – presentation, while others use it as the main channel for selling their products or services. Along with the growing involvement of businesses in the Internet space, the...
  10. Father

    Hacking as a business. Why do we need subscription hackers and how much does it cost?

    This year, many researchers are talking about an increase in business interest in cybersecurity and its tools. This process is largely due to the actualization of information security risks, which are based on a number of factors, from geopolitical tensions to simplifying access to malware and...
  11. Father

    Break — not build: what goals hackers choose in Russia

    The path of an information security incident to widespread fame is thorny. While the world is discussing data leaks from the next major companies and government agencies in different countries, we suggest that we talk about much more modest hacks. In this article, we will continue to deal with...
  12. Father

    Shadow Telegram: How hackers move from forums to instant messengers

    Telegram has been a leader among messengers all over the world for several years. In Russia, it has become not only a means of communication, but also a full-fledged platform through which products, services, ideas and views are promoted. Hackers also paid attention to this messenger. Many...
  13. Father

    Targeted by hackers: how to protect yourself from hacking video cameras and ensure your privacy

    On the one hand, video surveillance cameras are designed to increase the level of security and control, but on the other hand, they are vulnerable to intruders and can pose a threat to their owners. Cybersecurity experts told Cyber Media how cybercriminals gain access to cameras, what it...
  14. Father

    Held hostage by hackers: how a hospital in Cannes is fighting international cybercrime

    What was more important – the dignity or confidentiality of customers? In France, the Simone Weil Hospital (CHC-SV) experienced a cyberattack in April that disrupted the facility and forced staff to switch to using paper for record keeping. Now the hospital reports that the LockBit group...
  15. Father

    CISA: Critical flaw in GitLab actively exploited by hackers

    The agency is calling on federal agencies to fix the problem in their systems before it's too late. A critical flaw in the GitLab system that allows account management to be intercepted was recently added to the catalog of known exploited CISA vulnerabilities. The issue identified as...
  16. Father

    From carders to cryptographers: how the media image of "Russian hackers" has changed

    The media image of" evil Russians "in the West was formed in the 20th century, during the Cold War, and was often used not only in movies (the same "cranberry"), but also in public policy. The image itself has been transformed more than once, preserving its semantic core. If before the collapse...
  17. Father

    Hacking as a business. Why do we need subscription hackers and how much does it cost?

    This year, many researchers are talking about an increase in business interest in cybersecurity and its tools. This process is largely due to the actualization of information security risks, which are based on a number of factors, from geopolitical tensions to simplifying access to malware and...
  18. Father

    Latrodectus changes its face: Azure and Cloudflare in the hands of hackers

    The malicious downloader has received a new method of distribution and stealth. Attackers have started using a new tactic to spread Latrodectus malware through phishing campaigns, disguising it as notifications from Microsoft Azure and Cloudflare. This mechanism makes it more difficult for mail...
  19. Father

    SBU detains pro-Russian hackers in Kiev

    The Security Service eliminated bot farms in Kiev that carried out information sabotage in favor of Russian intelligence. During the complex events, two organizers were detained who massively spread disinformation about the war in Ukraine and tried to artificially discredit the Defense Forces...
  20. Father

    Critical breach in R allows hackers to launch an attack on the supply chain

    The vulnerability affects thousands of organizations that use this language in their software. A critical vulnerability has been discovered in the R programming language that could expose organizations using this popular open language to attacks across the software supply chain. The...
Top