hackers

  1. Friend

    Iran's Secret Deal: Millions for Hackers Silence

    The extortionists dealt a devastating blow to the country's banking system. In August, a large-scale cyberattack was carried out on Iran, which threatened the stability of the country's banking system. Sources familiar with the situation report that as a result of the incident, the government...
  2. Friend

    Penpie's Black Day: Hackers Stole $27 Million in One Attack

    Why do DeFi projects remain a prime target for digital criminals? In 2024, the number of hacker attacks on cryptocurrency projects continues to grow — the total amount of stolen funds has already exceeded $1.2 billion, which is 15.5% more than in 2023. One of the latest victims was the Penpie...
  3. Friend

    From Defense to Attack: MacroPack Defects to Hackers

    The tool for Red Team has become a powerful tool for stealthy attacks around the world. Cisco Talos has discovered that the MacroPack red command framework is being actively used by threat actors to distribute the Havoc malware, Brute Ratel, and the PhantomCore RAT Trojan. During the analysis...
  4. Friend

    Naked and Funny: OnlyFans Hunters Have Fallen Into The Trap Of Hackers

    In the world of cybercrime, predators may face the betrayal of their own colleagues. Veriti has discovered that cybercriminals have started using a fake OnlyFans account hacking tool that, instead of performing the promised functions, infects the attackers with the Lumma Stealer malware...
  5. Friend

    FBI: DPRK hackers destroy DeFi companies

    Crypto projects are losing millions due to North Korea's social engineering. In its new warning, the FBI states that employees of DeFi companies and cryptocurrency projects have recently been attacked by North Korea. Hackers from the DPRK use sophisticated social engineering techniques to...
  6. Friend

    MuddyWater is rampant: Legitimate RMM software in the service of Iranian hackers

    Virtuoso disguise leaves companies no chance to detect attacks. Security researchers from the 360 Advanced Threat Research Institute recently discovered that the Iranian hacker group MuddyWater is actively using legitimate remote monitoring and control (RMM) software in its attacks. This group...
  7. Friend

    EUCLEAK: Hackers Can Steal Your YubiKey Right From Under Your Nose

    Researchers have discovered a serious vulnerability in Infineon chips. Researchers have discovered a serious vulnerability in the popular YubiKey 5 two-factor authentication devices. This finding could jeopardize the security of many users who rely on these tokens to protect their accounts...
  8. Friend

    Spamouflage: How Hackers Influence Americans Political Views

    The pro-China manipulative campaign gained momentum in the run-up to the elections. Chinese influence operation Spamouflage has stepped up its efforts ahead of the 2024 US presidential election. According to a study by Graphika, behind this malicious activity are structures associated with the...
  9. Friend

    Windows Killer: CVE-2024-38106 Gives Hackers Direct Access to System Kernel

    The dangerous Zero-day was used long before the patch appeared. On September 2, security researcher Sergey Kornienko of PixiePoint published an analysis and demonstration of the exploitation of a critical zero-day vulnerability in the Windows kernel known as CVE-2024-38106. This privilege...
  10. Friend

    RACE: A Communication System That Even the Best Hackers Can Do

    The new DARPA project was developed based on the most stringent cryptographic standards. The US Defense Advanced Research Projects Agency (DARPA) has unveiled the source code for the RACE (Resilient Anonymous Communication for Everyone) distributed anonymous messaging system, which is in the...
  11. Friend

    Threat from China: Chinese hackers have become the main problem of German business

    Communication with foreign intelligence services increases the risks for large corporations. In recent years, cyberattacks have become a serious threat to German companies, and their number is growing rapidly. According to a recent study by the digital association Bitkom, published in Berlin...
  12. Friend

    Criminals or heroes? Young hackers are at the center of a legal scandal.

    Maltese nationalists ask not to judge the guys who saved the FreeHour service. In 2023, four students from Malta — Giorgio Grigolo, Michael Debono, Luke Bjorn Skerry, and Luke Collins — discovered a serious vulnerability in the FreeHour app, created to help students. Instead of ignoring the...
  13. Friend

    Chaos in education: hackers disrupted the work of the ministry in Guatemala

    The department answered the main question - how the attack on education in the country affected. The Ministry of Education of Guatemala officially announced a cyberattack that took place last week. As a result of the attack, the ministry's IT systems were damaged. However, the data of students...
  14. Friend

    Hackers use other people's malware and violate the bans of its authors

    Bi.Zone analysts noted that since the beginning of 2024, commercial malware, whose developers prohibit its use against organizations in the CIS countries, has been increasingly used to attack Russian companies. However, attackers disable regional restrictions and "pirated" versions of malware...
  15. Friend

    One click in Excel and your data is hackers hands

    The malware hides in a phishing Excel document. Recently, FortiGuard Labs, the research arm of Fortinet, documented a new phishing campaign that spreads malware through an attached Excel document. The analysis carried out showed that this document delivers a new version of Snake Keylogger, a...
  16. Friend

    The Dark Side of Digital Trust: EV Certificates Become a Weapon in the Hands of Hackers

    Digital signatures may not be as secure as they seem. Intrinsec has presented a report on the growing market for the use of extended validation (EV) certificates in cybercriminal schemes. The report takes a closer look at the techniques used by attackers to obtain and exploit these...
  17. Friend

    Link Shorteners and CAPTCHAs: How Hackers Turn Marketers Tools Into Cyberweapons

    How your favorite analytics tools can turn against you. Digital analytics tools such as link shorteners, location-based services, and CAPTCHAs play an important role in today's internet, helping system administrators drive traffic and marketers and advertisers deliver content to the right...
  18. Friend

    Is Messi a "dwarf" and Ronaldo "the greatest"? Hackers put on a show on Mbappe's page.

    The hacking of the player's account caused a storm of discussions. On the night of August 29, the account of French football player Kylian Mbappe on the social network X was hacked. As a result of the hack, posts with offensive statements appeared on the player's page, including about Lionel...
  19. Friend

    Alo, this is hacking: how hackers turn employee gullibility into millions of dollars

    More than 130 companies have fallen victim to social engineering. The GuidePoint Research and Intelligence Team (GRIT) has documented the activities of a highly developed hacker group with significant social engineering and network penetration skills, including the ability to communicate in...
  20. Friend

    From hunger to a million: fake pizzas have become a goldmine for hackers

    The international campaign attacks popular networks. BforeAI researchers have identified a massive phishing campaign targeting international pizza chains, resulting in significant financial losses. The investigation began after receiving information from the Singapore police about a phishing...
Top