hacking

  1. Teacher

    Silver SAML: a new cloud hacking technique that Microsoft can't stop

    How the attack allows an attacker to mimic any user. Semperis has revealed a new attack technique called Silver SAML, which can bypass security in identity systems. The Silver SAML technique allows you to use SAML to launch attacks from an identity provider (for example, Entra ID) against...
  2. Teacher

    Cyberspace hit Cencora: the pharmaceutical giant is looking for a cure for the consequences of hacking

    It is possible that valuable data was stolen from the company's networks, but which ones… The Fortune 500 pharmaceutical company Cencora, in documents for the US Securities and Exchange Commission, reported that it had identified unauthorized access and withdrawal of information from its IT...
  3. Teacher

    Hacking of the insurer Change Healthcare destroys the business of doctors and pharmacies in the United States

    Switching to paper documents is the smallest thing that a devastating attack has brought. Last week, a cyberattack on UnitedHealth Group disrupted drug and insurance sales at pharmacies across the United States, causing significant difficulties for healthcare workers. Experts warn that the...
  4. Teacher

    Hugging Face conversion service - a loophole for hacking AI models

    A vulnerability in Safetensors causes supply chains to be compromised. Information security company HiddenLayer has identified a vulnerability in Hugging Face's Safetensors conversion service that allows an attacker to intercept AI models uploaded by users and compromise the supply chain...
  5. Teacher

    Zero-Click in the Apple world: "quick commands" lead to "quick hacking"

    How did a useful feature turn into a powerful data theft tool? In the world of technology, a new threat has been discovered that affects users of Apple products. This time, the vulnerability concerns the Shortcuts application — a tool for creating custom automated tasks that is built into the...
  6. Teacher

    American-style cybersecurity: how a series of stupid mistakes led to the hacking of the government network

    Compromise could have been avoided by applying only a few simple security measures... The US Cybersecurity and Infrastructure Protection Agency (CISA), in collaboration with the Interstate Center for Analysis and Exchange of Information (MS-ISAC), found that unknown attackers gained access to...
  7. Teacher

    Hacking Prudential Financial: how hackers revealed the secrets of one of the largest financial companies

    Prudential Financial assesses the damage caused by the cyberattack. Prudential Financial, one of the leading financial and insurance companies, was the victim of a cyberattack that exposed the data of its employees and contractors. Information about the security breach was made public in Form...
  8. Teacher

    Duelbits crypto casino lost $4.6 million as a result of hacking

    On the night of February 14, hackers attacked the Duelbits cryptocurrency casino and withdrew funds for $4.6 million due to the compromise of the private key. This was reported by CertiK analysts. According to the researchers, the attackers removed the assets stored on the platform, converted...
  9. Teacher

    Hacking the ether: how to build a digital scanner for $ 250

    From the garage to the masses — the story of an invention. Recently, wiretapping the radio intercepts of the police and firefighters has become not so easy. Previously, it was enough to purchase a scanner, adjust the frequencies, and you could enjoy the process. However, with the development of...
  10. Teacher

    Apple thanks hacker arrested for hacking company systems

    A cybersecurity researcher who previously reported several vulnerabilities in Apple products is accused of infiltrating Apple's internal infrastructure and defrauding the corporation out of $2.5 million in gift cards and electronics. According to court documents, despite Noah Roskin-Frazi's...
  11. Teacher

    60 million for hacking: Positive Technologies challenges hackers

    A second event that is not allowed for the company has been added to the Positive Dream Hunting bug bounty program. Positive Technologies continues to improve its approaches to ensuring cybersecurity. As part of the bug bounty program Positive Dream Hunting, a second event that is not allowed...
  12. Brother

    Hacking or negligence? Binance's code and passwords have been available on GitHub for several months.

    Will the leak affect the security of clients and internal systems of the platform? An extremely sensitive array of data belonging to Binance has been located in the public GitHub repository for several months. As it became known to the publication 404 Media, the array contained codes...
  13. Brother

    DeFi Barley Finance reported a temporary outage due to platform hacking

    Decentralized yield protocol Barley Finance announced on social network X a temporary outage that occurred after an attacker exploited a vulnerability in the wBARL module. The Barley Finance team stated that the undocumented functionality of the wBARL module allowed a hacker to steal more than...
  14. Brother

    Crypto platform Somesing lost more than $11.5 million as a result of hacking

    South Korean cryptocurrency platform Somesing reported that it lost about 730 million of its own SSX tokens worth more than $11.5 million during a hacker attack. According to Somesing, the attackers withdrew 504 million unallocated SSX tokens, which were planned to be put into circulation by...
  15. Brother

    Hacking of the US Securities Commission: what was not enough to protect?

    Everyone can learn from this revealing attack on the SEC. The US Securities and Exchange Commission (SEC) has confirmed that its X*social network account was hacked. The security breach that occurred earlier in January was carried out through a SIM Swapping attack, while the account was not...
  16. Brother

    French student accused by FBI of massive hacking arrested in Morocco

    On January 9, a 22-year-old French citizen was sentenced to three years in prison for participating in the activities of the hacker group ShinyHunters. Sebastien Raoult, better known as Sezyo Kaizen, was extradited to the United States in January 2023 after being arrested in Morocco in 2022. He...
  17. Brother

    Russian scientists have questioned the conclusion of Chinese researchers about the possibility of hacking quantum algorithms

    A team of scientists from MISIS University, RKTs and Sberbank conducted an in-depth analysis of the calculations used by researchers from China when simulating hacking a cryptosystem using a 400+ qubit quantum computer, and questioned their sensational conclusion about a revolution in...
  18. Brother

    No more hacking: 22-year-old hacker promises to improve after three years in prison

    Sebastien Raoul has committed many crimes and doesn't want to upset his family again… On January 9, a 22-year-old French citizen was sentenced to three years in prison for participating in the ShinyHunters hacker group. Sebastien Raoul, better known as Sezyo Kaizen, was extradited to the...
  19. Brother

    New FHE encryption technology makes data invulnerable to hacking

    Fully homomorphic encryption allows you to process data without revealing its contents. In the world of computer security, a breakthrough is being planned thanks to fully homomorphic encryption (FHE) technology, which allows programs to work with encrypted data without decrypting it. The...
  20. Brother

    NFT Trader lost about $3 million as a result of hacking

    Unknown people attacked the old smart contracts of the P2P platform NFT Trader and withdrew non-fungible tokens. The project team confirmed the incident. Revoke Cash specialists estimated the losses at approximately $3 million. Most of the damage was made up of NFTs from the Bored Ape Yacht...
Top